Vous êtes sur la page 1sur 84

ACRONIS BACKUP

CLOUD
Support Training Part 1: Product and Functionality
overview Dual headquarters
Dual headquarters
in Switzerland and Singapore
Proprietary and Confidential © 2019 1
in Switzerland and Singapore
Training agenda
This is Part 1 of support training for Service Providers. It contains technical overview of Acronis Backup
Cloud and covers following topics:

• Product overview

• Management Portal

• Backup and recovery operations

This training does not substitute user guide with full product functionality description and hands-on
experience with the product, which are required for effective product support.
Part 2 of the training explains the approach for troubleshooting technical issues.

Dual headquarters
Proprietary and Confidential © 2019 2
in Switzerland and Singapore
Overview
• functionality
• architecture

Dual headquarters
Proprietary and Confidential © 2019 3
in Switzerland and Singapore
Acronis Backup Cloud Overview
Acronis Backup Cloud is a branded, managed cloud backup and disaster recovery solution for Value-
Added Resellers, Hosting Companies and Cloud Service Providers
It allows Partners to provide backup service to Customers directly and/or via reseller hierarchy

Microsoft Physical Acronis Backup Cloud


Exchange Machines Acronis
• Multi-tier, multi-tenant architecture Cloud
Files
• Web-based user Interface Storage Partner
Microsoft Mobile Virtual
SQL devices Machines
• Individual or centralized backup Storage:
plans – Local
Volumes
Microsoft • Retention and clean-up rules – Public
Active Website System cloud
Directory State
• Backup encryption Local
Disks • File and disk recovery Disk
Microsoft • VM backup and recovery Storage
SharePoint Office 365

Disaster Recovery  Data Protection  Migration


Active Windows, Linux, VMware vSphere, Hyper-V, Virtuozzo, Mac OS, Exchange, SQL, AD, SharePoint, Office
GSuit
Protection 365 (Exchange Online, OneDrive, SharePoint Online), GSuit (Gmail, Google Drive, Team Drives, Google
Contacts, Google Calendar).
Dual headquarters
Proprietary and Confidential © 2019 4
in Switzerland and Singapore
Acronis Backup
Cloud Architecture

Dual headquarters
Proprietary and Confidential © 2019 5
in Switzerland and Singapore
Management Portal
The following components are installed in Acronis data center
side for account management and can be accessed via web
browser at Account Server

https://cloud.acronis.com
Account Server
Stores the user account hierarchy and enables
administration of the backup service via web browser, e.g.
creating groups, user accounts and administrators,
rebranding and reporting

Management Portal
Provides user interface for Account Server Management Portal

Dual headquarters
Proprietary and Confidential © 2019 6
in Switzerland and Singapore
Backup Management
For all backup management operations following components
are installed in the same data center:
Backup Management Server Backup Management Server

Enables users and administrators to manage backup


clients, set up and monitor backup jobs

Backup Management Console


Provides user interface for Backup Management Server
and manages Agents

Customers log in at https://cloud.acronis.com directly to Backup


Management Console. Administrators can access it from the
Management Portal
Backup Management
Console

Dual headquarters
Proprietary and Confidential © 2019 7
in Switzerland and Singapore
Web Restore
Web Restore functionality is provided by the Web
Restore application:
Web Restore Server

Web Restore Server


Enables users to restore files from Cloud Storage
Web Restore Console
Provides user interface for download of files and folders
from the Cloud Storage

Customers log in directly to Web Restore Console Web Restore Console

Dual headquarters
Proprietary and Confidential © 2019 8
in Switzerland and Singapore
Cloud Storage
Acronis Storage
Scale-out storage software designed to run on commodity
hardware, thus eliminating the dependence on expensive,
special-purpose hardware Acronis Storage

Two possible options:


• Acronis DC Storage

Performance
• Partner-hosted Storage (SDI) Capacit
y

Scale-Out Storage

Dual headquarters
Proprietary and Confidential © 2019 9
in Switzerland and Singapore
Agents
The following components are installed on Customer side to protect
respective workload:
Servers/Workstations: Applications:
Agent
– Agent for Windows (x86, x64) – Agent for SQL
– Agent for Mac (x64) – Agent for Exchange
– Agent for Linux (x86, x64) – Agent for Active Directory

Hypervisors: Cloud agent:


– Agent for Hyper-V – Website backup
– Agent for VMware (Windows) – Office 365:
• mailboxes
– Agent for VMware (Virtual • SharePoint online
Appliance) • Microsoft OneDrive
• Exchange Online
– Agent for Virtuozzo
– GSuit:
Mobile devices: • Gmail
– Mobile app for iOS • Google Drive
• Team Drives Backup Management
– Mobile app for Android • Google Contacts Console

• Google Calendar
Dual headquarters
Proprietary and Confidential © 2019 10
in Switzerland and Singapore
External interaction with a Data Center
Interaction with the DC:
Administrators interact
with the Management Portal

End users interact with the


Backup Management
Console

Agents interact with the


Backup Management
Server and the Cloud
Storage

Dual headquarters
Proprietary and Confidential © 2019 11
in Switzerland and Singapore
Account
Management
• hierarchy and user permissions
• account management
• API integration
Dual headquarters
Proprietary and Confidential © 2019 12
in Switzerland and Singapore
Acronis Backup Cloud Hierarchy
Account Hierarchy may have any number of levels, e.g. multiple Partners or Customers. In
order to make management of it easier, the following were introduced:

Groups
Partner group for MSPs and resellers who will manage their customers. Partner group
can be assigned service offerings and soft quotas on specific resources
Customer group for end user companies, who will be using the service. Customer
group can be assigned service offerings, soft and hard quotas on specific resources
Folders to group Partner or Customer groups. Can be assigned service offerings and
soft quotas on specific resources
Users
Partner group or folder users are for partner administrators to manage the services
within the Cloud Platform
Customer group users are for customer administrators and end users to use the
service. Each user can be assigned managed services (Backup and Disaster Recovery,
Files Cloud), personal quotas and roles (Company administrator)

User login should be unique in Acronis Backup Cloud, e-mail can be used repeatedly Folder
Folder admin

Dual headquarters
Proprietary and Confidential © 2019 13
in Switzerland and Singapore
User Permissions and Services
Users can be assigned services and roles within these services:
Management Portal
• Company Administrator can access Management Portal on his group
level and manage all users within his group
Backup
• User can install agents, manage backup and recovery operations
Notary
• Enables users to notarize and verify files by using the Blockchain
technology, and sign files electronically.
Sync & Share
• Administrator can manage Sync & Share tenants policies, settings,
customize web UI and access audit log; Administrator is always a
service user
• User can sync and share files
Disaster Recovery Service
• Protect customer’s environment with Recovery servers
• Deploy Primary servers from pre-configured templates
Physical Data Shipping
• Allows sending an initial backup to the cloud data center on a hard disk
drive.

Dual headquarters
Proprietary and Confidential © 2019 14
in Switzerland and Singapore
Management Portal
Operations

Dual headquarters
Proprietary and Confidential © 2019 15
in Switzerland and Singapore
Management Portal Overview Search bar

Create groups and users

Hierarchy

Usage Counters

Dual headquarters
Proprietary and Confidential © 2019 16
in Switzerland and Singapore
Branding for reseller groups
Branding is applied to all sub-groups
(not to the group where it is set):

• White label
• Logo, Color Scheme
• Company name
• Custom URLs
• Support Phone
• User Guide and Help URL
• Mobile apps links
• Email Server settings (notifications
sender)
• Possibility to preview branding settings
• Customize the page title Example

Dual headquarters
Proprietary and Confidential © 2019 17
in Switzerland and Singapore
Creating groups
In group properties you can set:
• Usage mode (for end user groups): trial/paid
• Notifications language
• Group quotas (both reseller and end user groups)
• Billing information
• Cloud Storage

Partners can add new Cloud Storage by downloading


Acronis Software-Defined Infrastructure ISO
Cloud Storage can be assigned to the Customer group
when the group is created.
To change Cloud storage for a Customer group later, it’s
necessary to delete all its backups from Cloud first (drop-
down menu is active only if cloud space usage = 0).

Dual headquarters
Proprietary and Confidential © 2019 18
in Switzerland and Singapore
Moving groups
Change your account hierarchy by moving
groups to folders and partner groups:

• Find new parent group’s tenant ID


• Move other groups under new parent groups with the
selected tenant ID
• A tenant can be moved only if the target parent
tenant has the same or a larger set of services
and offering items as the original parent tenant.

All parent group service-related settings will apply


to children groups. This may disable some
service offerings for sub-resellers and
Customers.

Dual headquarters
Proprietary and Confidential © 2019 19
in Switzerland and Singapore
Creating users
User is created within the selected hierarchy. To create a user
for a Customer, first drill down to the Customer’s group.

Every user is authenticated in the Data Center by it’s login:


• Login must be unique
• One e-mail address can be used for multiple logins
(activation is done via a link in the e-mail)

Other user properties:


• Services and roles (partners can only be Management
Portal administrators)
• Notifications (separate for Management portal and other
services)
• Personal quotas (only for Customer users)

Dual headquarters
Proprietary and Confidential © 2019 20
in Switzerland and Singapore
Services, offerings and quotas
• Management of cloud services is done via services, offerings
and quotas on group and user level.
• Disabling the service removes all its offerings and quotas.
• Disabling the offering removes all its quotas.

Services

Offerings

Quotas

Dual headquarters
Proprietary and Confidential © 2019 21
in Switzerland and Singapore
Offerings
Disabling the offering hides respective item
in the Backup management console.
E.g., when offering is disabled for for
physical servers and virtual machines, only
agents for physical workstations are
available.

Disabling Local backup offering fixes selection of backup destination on


Cloud Storage
To allow local only backups, disable cloud storage offering

Dual headquarters
Proprietary and Confidential © 2019 22
in Switzerland and Singapore
Quotas
Offerings and quotas can be enabled on group and user levels.
• When an offering is disabled, associated resources and quotas do not appear for the subgroups.
• There are two types of quotas:
Soft quota: when exceeded, triggers a notification about service overuse
Hard quota (overage): when exceeded, resource usage is suspended

Account level Soft quotas Hard quotas Service usage calculation


Partner / Folder group Yes N/A Sum of all Customer groups usage
Partner / Folder user N/A N/A No service usage
Customer group Yes Yes Sum of all user accounts usage
Customer user Yes Yes Personal service usage

Partner-level quota does not affect Customer quota and does not limit service usage for lower levels of hierarchy. To
limit service usage, set hard quotas on Customer level.

Dual headquarters
Proprietary and Confidential © 2019 23
in Switzerland and Singapore
Quotas
• After reaching the quota limit, a business notification is sent
• After exceeding the overuse limit backups are suspended, currently running
backups continue

Backup finishes successfully, notification Backup finishes


about exceeded quota is sent successfully,
notification is sent,
further backups are
suspended

Backup Backup

Storage quota Overuse limit Above limit

Dual headquarters
Proprietary and Confidential © 2019 24
in Switzerland and Singapore
Backup Operations Dashboard
Manage backups at a glance
Quickly review the health of your backup infrastructure. Widgets
can be configured to show either global (aggregate data across all
customers) or data per customer.

Customize your view


Create a dashboard tailored to your needs
by adding and customizing the following
widgets:
• Activities • Protected devices
• Active alerts • Activities summary
• Alerts summary • Active alerts details
• Alerts

Convert “partner” to “folder” tenants


Some partners used to create “partner” tenants for customers-
grouping purposes. So that all customer statistics are visible in a
single dashboard, as the new dashboard only displays information
about direct customers, we've added the ability to convert
"partner" tenants to "folder" tenants.

Dual headquarters
Proprietary and Confidential © 2019 25
in Switzerland and Singapore
Customizable Backup and Usage reports
Create customizable usage reports
Choose level of details, set custom period, choose among
summary and daily statistics
Create custom reports
Create reports by adding and customizing widgets showing
data across all customers or individually, or simply use a
preconfigured report template.

Send and receive reports via email


Send reports to a list of recipients once or on a schedule.

Send reports to any person


To receive reports, a person does not need to have
administrator rights. Add any email in the “recipient” field.

Download or send reports in multiple formats


Get reports in the format you need:
• XLS
• CSV
• PDF

Dual headquarters
Proprietary and Confidential © 2019 26
in Switzerland and Singapore
Management Portal (Platform)
Audit log
The events initiated by a user of the system itself
within Management Portal are now tracked and logged: what, when,
where and who is an initiator.

The following events are currently included (Management


portal ):
• Service events (for instance Backup&Disaster recovery was
enabled for partner)
• Offering item events (add, delete, update, etc.)
• Infrastructure components events (for instance Storage was
added)
• Quota events (delete, update, etc.)
• Tenant events (add, delete, update, etc.)
• User events (add, delete, update, etc.)

Current limitations:
• Password change event is not traced
• No info about unsuccessful logins

Future plans:
• Fix limitations mentioned above
• Add retention rules (configured on DC level)
• Add export capabilities
• Add application event support (Backup, Files Cloud, Physical
Data Shipping, etc.)

Dual headquarters
Proprietary and Confidential © 2019 27
in Switzerland and Singapore
Disabling and deleting users, groups, partner-hosted
storages
Administrator can disable an account or a group:
• No notification is sent
• This does not affect the backup plans created by this account/group
• User/group can then be deleted

When user account is deleted:


• His machines, plans and cloud backups are removed
• Quotas are revoked

When a group is deleted:


• All its administrators and accounts are deleted
• All its subgroups are deleted
• All related machines, plans and cloud backups are removed
• Quotas are revoked

Partner who has registered his own on-premise storage instance can delete it from
management portal without contacting Acronis support team (but only in case it
has 0 space usage).
When a hosted storage is deleted:
• All backups stored on it are deleted
• Customer groups which were assigned and backed up to this storage have
their cloud storage offering disabled

Dual headquarters
Proprietary and Confidential © 2019 28
in Switzerland and Singapore
API Integration

Dual headquarters
Proprietary and Confidential © 2019 29
in Switzerland and Singapore
API integration: ready solutions
Acronis provides OOB integrations for most popular provisioning systems

Management Portal

not required

https://[dc]-cloud.acronis.com/api/1/
https://[dc]-cloud.acronis.com/api/2/

*API documentation is available at https://[dc]-cloud.acronis.com/api/1/doc and https://[dc]-cloud.acronis.com/api/2/doc


for logged in users Management
Portal

Dual headquarters
Proprietary and Confidential © 2019 30
in Switzerland and Singapore
Management Portal API: supported operations
For groups: For users:
– Create groups – Create users
– Move groups – Manage services, roles and quotas
– Set branding options – Manage notifications
– Set cloud storage – Link to managed services
– Manage services, offerings and quotas – Agent download link in control panel
– Retrieve service usage information for billing

Limited access and restrictions:


− Lock the group in Account Management Console to
avoid sync problems
− Create users with limited privileges (read-only)
− Disable inheritance of higher-level administrators

Dual headquarters
Proprietary and Confidential © 2019 31
in Switzerland and Singapore
Agent functionality
• Installation
• Protecting data
• Recovering data
• Monitoring
Dual headquarters
Proprietary and Confidential © 2019 32
in Switzerland and Singapore
User activation and login
End user is created via Account Management Console or 3rd party provisioning tool and
receives the activation email

Dual headquarters
Proprietary and Confidential © 2019 33
in Switzerland and Singapore
Installation

Dual headquarters
Proprietary and Confidential © 2019 34
in Switzerland and Singapore
Download installation package
Add button opens the list of all available installers with download links
• All Agents for Windows are by default Web installers. Full installer is available for both x32/x64
• Language is selected for installation wizard. Agent language is defined by OS settings
• A virtual machine is considered virtual both if it is backed up by an external agent (VMware, Hyper-V, Virtuozzo) and if
an agent is installed in the guest system

Dual headquarters
Proprietary and Confidential © 2019 35
in Switzerland and Singapore
Supported platforms
Windows 2003, XP SP2 and above, up to Windows 2012 R2 and Windows 10 x86 and x64 OS. Windows Server 2016,
Windows Windows Server 2019

Linux Linux kernel 2.6.9 to 4.9 and glibc 2.3.4 or later, various x86 and x64 Linux distributions

OS X Mavericks 10.9
OS X Yosemite 10.10
OS X El Capitan 10.11
MAC OS X OS X Sierra 10.12
OS X High Sierra 10.13
OS X Mojave 10.14

VMware ESX(i) 4.1 and above, up to 6.7


Virtual Microsoft Hyper-V on Windows 2008 (x64) and above, up to Windows 2012 R2, Windows 8, 8.1, 10 (x64) with Hyper-V.
Windows Server 2016 with Hyper-V; Microsoft Hyper-V Server 2016
(agentless)
Virtuozzo 6.0.10, 6.0.11, 6.0.12 (VMs and containers)

Microsoft Exchange Server 2007 and above, up to 2016


Applications Microsoft SQL Server 2005 and above, up to 2017

Smartphones and tablets running Android 4.1 or later


Mobile iPhones, iPads, and iPods running iOS 8 or later

*For the full list of supported platforms refer to product’s User’s Guide: https://www.acronis.com/en-gb/support/documentation/BackupService/

Dual headquarters
Proprietary and Confidential © 2019 36
in Switzerland and Singapore
System requirements
• Typical memory consumption is 300 MB above the operating system and running applications
• Peak consumption may reach 2 GB, depending on the amount and type of data being processed by the agent

Agent Disk space occupied by the agent(s)


Agent for Windows 550 MB
Agent for Linux 500 MB
Agent for Mac 450 MB
Agent for VMware 700 MB (150 MB + 550 MB Agent for Windows)
Agent for Hyper-V 600 MB (50 MB + 550 MB Agent for Windows)
Agent for Virtuozzo 500MB
Agent for Exchange 750 MB (200 MB + 550 MB Agent for Windows)
Agent for SQL 600 MB (50 MB + 550 MB Agent for Windows)
Agent for Active Directory 600 MB (50 MB + 550 MB Agent for Windows)
Agent for Office 365 550 MB

Dual headquarters
Proprietary and Confidential © 2019 37
in Switzerland and Singapore
Network requirements
Ports usage:
• 443 and 8443 These ports are used for accessing the backup console, registering the agents, downloading the certificates, user
authorization, and downloading files from the cloud storage
• 7770...7800 The agents use these ports to communicate with the backup management server
• 44445 The agents use this port for data transfer during backup and recovery
• 80 Web-triggered update uses this port to download installation packages
Throughput:
• Agents are connected to the Backup Management Server and perform constant synchronization, this gives minor network load
• Throttling policies can be set in the backup options
• VMware ESX(i) VM backup is done via local network by the Agent for VMware running on Windows. If your ESXi uses a SAN attached
storage, install the agent on a machine connected to the same SAN. The agent will back up the virtual machines directly from the
storage rather than via the ESXi host and LAN
Interruptions during backup to Cloud:
• Agent performs multiple reattempts (backup options) and can ignore interruptions
• Resumable backup: if reattempts fail or if backup fails for any reason, partial backup remains in the storage (incomplete backup)
and is unavailable for restore. Next backup will upload only the changes since the last attempt, also the data from first attempt, if it was
changed (https://kb.acronis.com/content/56049)
NAT and proxy are supported

Dual headquarters
Proprietary and Confidential © 2019 38
in Switzerland and Singapore
Agent registration
When the Agent components are installed, it should be registered on
the Backup Management Server in order to be managed through the
Backup Management Console:
1. Once components are installed, the registration screen appears,
Click Register now.
2. Alternatively, once the registration screen appears, Click Show
registration info, Copy Registration link and Registration code
• Setup program automatically obtains the Registration code
• The registration code is valid for one hour
• After one hour it will be automatically renewed

3. Open browser on any machine with Registration link  Log in to


Backup console  Enter the registration code
4. Review the registration details, and then click Confirm
registration

Once registered, agent constantly syncs with the Backup


Management Server to receive Backup Management Console
settings and send statistics.

Dual headquarters
Proprietary and Confidential © 2019 39
in Switzerland and Singapore
Installed components
Windows Linux Mac

Locations

Settings HKLM\SOFTWARE\Acronis /etc./Acronis /Library/Application Support/Acronis/

Logs and local DB C:\ProgramData\Acronis /var/lib/Acronis /var/lib/Acronis

/usr/lib/Acronis/BackupAndRe
Bootable components C:\ProgramFiles\BackupClient\Agent /Applications/Rescue Media Builder.app
coveryAgent

Services

Backup & Recovery Acronis Managed Machine Service /etc./init.d/acronis_mms /Library/LaunchDaemons/com.acronis.acronis_mms

Connectivity Acronis Remote Agent /etc./init.d/acronis_agent /Library/LaunchDaemons/com.acronis.acronis_agent

• /etc./init.d/acronis_schedul • /Library/Application
Scheduler Acronis Schedule2 Service e Support/BackupClient//Acronis/Schedule/schedwrapper
• cron • launchd
• Log on as a service
• Adjust memory quotas for a
process
Service user privileges • Replace a process level token root Admin
Groups:
• Acronis Remote Users
• Backup Operators

Dual headquarters
Proprietary and Confidential © 2019 40
in Switzerland and Singapore
Update agent
Local
On each machine download the installation package and
run it. Installation package detects the installed components
Web
From the web interface you will see the warning sign on the
Updates pane, where you select the agents to update and
click Install now

Update technology:
Windows: agent downloads live_update_installer.exe from
Backup Management Server, which downloads the
installation file through port 80 from dl.managed-
protection.com and runs it
Linux, Mac: agent (service_process) downloads the file and
runs it

Dual headquarters
Proprietary and Confidential © 2019 41
in Switzerland and Singapore
Protecting data

Dual headquarters
Proprietary and Confidential © 2019 42
in Switzerland and Singapore
Select the devices
To start protecting data:

1. In Devices select the pane for resources


that you want to protect
2. Select one or more machine / application to
protect
3. Go to Backup to configure the backup plan

Refer to the following KB article describing the


meaning of each icon under Web Console:
https://kb.acronis.com/content/59019

Dual headquarters
Proprietary and Confidential © 2019 43
in Switzerland and Singapore
Backup plan definition
Backups are defined by the backup plans with following parameter sets:
• What to backup
• Where to store
• Schedule the backup
• How long to keep
• Options

Backup plan can contain different tasks, depending on the settings. Each backup type (full,
differential, incremental) and additional task (retention, validation, replication) is stored in the
backup plan as a separate task and runs by it’s own rules (schedule)
One backup plan can have only one set of settings, and if those are modified for any machine,
you must choose whether to modify the plan on all machines, or create a new plan
Account hierarchy defines how the backup and administrator accounts see the backup plans.
User account can see only plans applied to machines associated with that user account. If plan
was created by an administrator account, user account cannot modify it. If the backup plan was
created by a higher hierarchy administrator, it cannot be modified on a lower level even by the
administrator account

Dual headquarters
Proprietary and Confidential © 2019 44
in Switzerland and Singapore
Backup plan management
Backup plan is created and stored on the Backup Management Server, and deployed to the selected machines
Deployed backup plan runs locally on the Agent and does not require connection to the Backup Management Server to
be started on schedule

Actions with a backup plan:


Once edited, you can save changes to all machines
with this plan, or create a new plan 1. Backup plan is 2. Plan is
created on the server deployed to 3. Plan starts on
When a plan is renamed on one machine, it is the agent schedule
renamed on the Backup Management Server for all Agent
machines
Backup plan can be revoked from one machine but
it is still available on other machines and on the
Backup Management 4. Status data
Backup Management Server Server is sent to the
server
Backup plan can deleted from all machines (list of
machines is shown) and from the Backup
Management Server

Dual headquarters
Proprietary and Confidential © 2019 45
in Switzerland and Singapore
Backup parameters
and options

Dual headquarters
Proprietary and Confidential © 2019 46
in Switzerland and Singapore
What to back up
In the drop-down menu select the available source
options for backup:
• It will depend on the selected device or application
• Further plan parameters will depend on this selection

Windows Linux Virtual Machine

Exchange
SQL

Dual headquarters
Proprietary and Confidential © 2019 47
in Switzerland and Singapore
Granularity of backup and recovery
Depending on the Agent installed on the system and the backup type, backup and recovery items will vary

Data to backup on Windows: Data to recover on Windows:


Exchange Server SQL Server Exchange databases SQL Server SharePoint Databases

System Files & Exchange SQL Databases System Files & Folders Exchange Mailboxes SQL Databases SharePoint Data
Folders Databases

Acronis Agent Backup type Backup items Recovery items


Agent for Windows / Linux File-level backup Files and folders Files and folders
Agent for Windows / Linux Disk-level backup Entire machine / disks / volumes Entire machine / disks / volumes / files and folders
Agent for Windows / Agent for VMware Application-aware backup Entire machine Entire machine / disks / volumes / files and folders /Active Directory
/ SQL instance / SQL database / SharePoint data / Exchange
database / Exchange mailboxes and items
Agent for SQL SQL backup SQL databases SQL server / SQL database / SharePoint data
Agent for Active Directory Application-aware backup Entire machine / disks / volumes Entire machine / disks / volumes / files and folders
Agent for Exchange Exchange backup Exchange databases Databases / Mailboxes and items
Agent for VMware / Agent for Hyper-V VM backup Entire machine / disks / volumes Entire machine / disks / volumes

Dual headquarters
Proprietary and Confidential © 2019 48
in Switzerland and Singapore
Where to back up
If Service Provider has several offerings of Cloud Storages
in different geographic locations, end users cannot select
among them. The storage is defined by the Customer group
storage settings in Account Management Console
For backups created to local or network folder, copy of the
backup to another location (replication) can be set. In this
case once backup is created, it is immediately copied to the
second location
Backup Archive name (in all locations) includes the
machine name and the backup plan ID.

Dual headquarters
Proprietary and Confidential © 2019 49
in Switzerland and Singapore
When to backup
Scheduling options vary depending on the
destination
Cloud backup can only have incremental backups.
Local backup’s scheme can be chosen manually.
Scheduling options are registered in the Agent’s local
scheduler once the backup plan is deployed from
Backup Management Server.

Schedule conditions for notebooks


Saving battery power:
• Do not start backup when on battery
Preventing backup over metered connection (e.g.
mobile hotspot)

Preventing backup over VPN:


• IP range checking to avoid starting backup out of office
Ensure backup start:
• Prevent machine from sleep/hibernate
• Wake up machine from sleep/hibernate

Dual headquarters
Proprietary and Confidential © 2019 50
in Switzerland and Singapore
Backup types and formats
Full backup F F F
A self-sufficient backup containing all data chosen for backup. You do not need access to
any other backup to recover the data from a full backup

Incremental backup F I I
A backup that stores changes to the data against the latest backup. You need access to
other backups to recover data from an incremental backup

Differential backup
A differential backup stores changes to the data against the latest full backup. You need F D D D
access to the corresponding full backup to recover the data from a differential backup

Single-file backup format (always incremental backup)


A new backup format, in which the initial full and subsequent incremental backups are
saved to a single .tib file, instead of a chain of files. This format leverages the speed of the
incremental backup method, while avoiding its main disadvantage–difficult deletion of F I I
outdated backups. The software marks the blocks used by outdated backups as "free" and
writes new backups to these blocks. This results in extremely fast cleanup, with minimal
resource consumption.

TIBX - new generation archive format


Each backup chain F+I+…+I will be kept in a separate .TIBX file
Better compression
Validation of encrypted archives without password
Fast search by file name in file backup, based on built-in indices
Improved backup speed

Dual headquarters
Proprietary and Confidential © 2019 51
in Switzerland and Singapore
How long to keep
Retention rules are the same for all destinations
A backup stored in a local or network folder cannot be
deleted if it has dependent backups that are not subject
to deletion. Such backup chains are deleted only when
the lifetime of all their backups expires. This requires
extra space for storing backups whose deletion is
postponed. Also, the backup age and number of backups
may exceed the values you specify
In single-file backup the slices are marked for deletion
instead of being immediately removed. Data is not
removed from the backup file, marked blocks are
overwritten with the next backup
Retention rules are applied after the backup and can be
triggered only by running the backup plan

Dual headquarters
Proprietary and Confidential © 2019 52
in Switzerland and Singapore
Modify backup options
Adjust following parameters in the backup options:
• Backup performance
• Schedule settings
• Snapshot options
• Error handling
• File-level backup options
• Initial seeding

See user’s guide for more details:

Dual headquarters
Proprietary and Confidential © 2019 53
in Switzerland and Singapore
Physical Data Shipping
Initial seeding allows end user to send the first backup, which is full and usually the largest, to Service Provider on a
hard drive instead of over the Internet connection. Service Provider uploads the backup with the Initial Seeding tool to
the cloud storage with high uplink. Subsequent incremental backups can be transferred over the Internet after the full
backup has arrived in the cloud storage
Once the Service Provider uploads the initial seeding backup to the Cloud Storage (see how-to at
https://kb.acronis.com/content/56070), end user can continue creating incremental backups to cloud
For Large Scale Recovery (reverse process) end user must provide the Service Provider with the machine token

Dual headquarters
Proprietary and Confidential © 2019 54
in Switzerland and Singapore
Physical Data Shipping

• Set hard and soft quotas for the number


of PDS orders Customer can ship
• Check upload statuses, tracking
numbers and information about HDDs for
active and completed orders

Dual headquarters
Proprietary and Confidential © 2019 55
in Switzerland and Singapore
Mobile devices backup Website backup

• Protect and manage Android and iOS devices with mobile


apps
• Browse mobile backups through web and restore files to the
computer Cloud-to-Cloud backup of website is performed via
SSH/SFTP connection to remote website
Backup and cross-platform restore:
• Website content is copied on file level. Entire user
filesystem scope is backed up
• Optionally extract MySQL database content to add to
backup. Press skip to ignore
• Contacts • Contacts
• One backup plan can be applied to a single website.
• Photos • Photos
Add new backup plan for additional websites
• Videos • Videos
• Calendars • Calendars
• Reminders • Messages

Dual headquarters
Proprietary and Confidential © 2019 56
in Switzerland and Singapore
Application-aware backup
Application-aware backup is available
for both physical and virtual machines
for following applications:
• MS Exchange
• MS SQL Server
• MS Active Directory
• MS SharePoint (uses Agent for SQL’s functionality)

Back up entire machine, recover:


• SQL Server databases
• Exchange databases and mailboxes

Dual headquarters
Proprietary and Confidential © 2019 57
in Switzerland and Singapore
Exchange Online OneDrive SharePoint
Backup Backup Online Backup
Backup features Backup features Backup features
Backup of: • Files, folders Backup of SharePoint Online
• user mailbox, contacts, calendar, • File filters support: sites:
tasks  e.g. “do not back up *.bak” • Site collections
• group mailbox  Or “back up *.docx“ • Team sites
• archive mailbox • Communication sites

Restore features Restore features Restore features


• Granular point-in-time recovery • Granular point-in-time recovery • Granular point-in-time recovery:
of mailbox items • Search files through backup  Entire site
• Search mails through backup • Cross-user and cross-org  Subsite
• Cross-user and cross-org  etc
recovery
recovery • Search items through backup
• Restore to custom folder via live • Restore to custom folder via live
• Cross-org recovery: recovery to
browsing of mailbox content browsing of OneDrive content
another Office 365 organization
• Preview email content • Download file from the backup
• Download file from the backup
• Download email attachments • Permissions recovery
• Send mail from backup as email • Permissions recovery
message
Dual headquarters
Proprietary and Confidential © 2019 58
in Switzerland and Singapore
Google Drive backup
• List of users is automatically
synchronized with G Suite
• File filters support:
 e.g. “do not back up *.bak”
 or “back up *.docx“
• Granular point-in-time recovery
of files
• Cross-user and cross-org
recovery
• Restore to custom folder via
live browsing of Drive folders
structure or selection rules
• Sharing permissions recovery
• Simple search of files by name
• Download file from the backup
• Google Drive backup
notarization

Dual headquarters
Proprietary and Confidential © 2019 59
in Switzerland and Singapore
Acronis Active Protection from ransomware
Actively protects your data from
ransomware and other threats on
Windows machines:
• Network folders protection on client
side

• Removable devices tracking

• Machine-learning based stack analyzer


to prevent Ransomware attacks

• Deep detailed description why process


was detected as potential Ransomware

• Manage backup protection (*.TIB and


*.tibx files) separately from Self-
defense for each process

• Choose how AP will react once threat is


detected (action on detection)

Dual headquarters
Proprietary and Confidential © 2019 60
in Switzerland and Singapore
VMware VM replication
To minimize RTO of business critical VMs, create VM replicas
instead of backups:
• Maintain replicas of important VMs
• Synchronize original VMs state with replicas on schedule
• Test replica, failover and failback

Dual headquarters
Proprietary and Confidential © 2019 61
in Switzerland and Singapore
Backup technology

Dual headquarters
Proprietary and Confidential © 2019 62
in Switzerland and Singapore
Backup Sequence Additional tasks:
• validation
• replication
I/O frozen I/O unfrozen • cleanup
Backup

START Pre Initiate Pre data Take Post data Complete Post END
command* snapshot capture snapshot capture Start backup backup command*
technology command* command*

Snapshot taken Additional


Backup Plan Agent(s) starts tasks:
Backup Plan Freeze all disk of all disk Unfreeze all replication, Backup Plan is
script deployed backup process
created I/O blocks to be disk I/O validation, finished
to computer(s) as per script
backed up cleanup

Pre data Post data


Pre commands capture capture Post commands
are executed commands are commands are are executed
executed executed

Snapshot VSS-aware VSS-aware Backup starts


technologies applications are applications are with reference
are initiated quiesced** unquiesced to snapshot

* Pre/Post commands and Pre/Post data capture commands are optional and can be configured in Backup options
**For non-VSS aware applications, depending on the snapshot technology, crash-consistent quiescing will be performed, i.e., write all valid data to disk to prepare for snapshot

Dual headquarters
Proprietary and Confidential © 2019 63
in Switzerland and Singapore
Recovering data

Dual headquarters
Proprietary and Confidential © 2019 64
in Switzerland and Singapore
Browse backups in different locations
Select the agent that will perform browsing and recovery
and backup’s location.
Operations with backup locations:
− User can add and remove locations
− Each user can have access only to his own list of locations
− Admin in the end user company has access to all locations across
the company

• When you select a protected machine and click Recovery, you can
see its recovery points
• Recovery point date refers to the time when the backup task was
started
• Recovery points are not shown for offline computers
• Encrypted backups will have a locker sign on the recovery points

Dual headquarters
Proprietary and Confidential © 2019 65
in Switzerland and Singapore
Recover machine from the web console
Entire machine can be recovered to a Physical machine or to a Virtual machine
Physical machine is considered the machine where an agent is installed; VM can be created on any managed hypervisor (ESXi and
Hyper-V)
In case a backup is recovered to a different physical machine with dissimilar hardware, during recovery Acronis Universal Restore fixes
bootability using drivers found in the system folders. If drivers for new hardware are not found and machine fails to start, boot it with the
Acronis Bootable Media and apply Universal Restore with necessary drivers
If a system disk is recovered, agent automatically reboots to the Bootable Media and continues with the recovery process. Once recovery
is finished, machine is rebooted and goes back online

Dual headquarters
Proprietary and Confidential © 2019 66
in Switzerland and Singapore
Application
recovery

Dual headquarters
Proprietary and Confidential © 2019 67
in Switzerland and Singapore
Granular recovery of Exchange data
Preview mail content before recovery:
search through mailbox, download
attachments and recover:
• Entire mailbox
• Mails
• Attachments
• Contacts
• Calendars

MS Exchange 2016 is supported


MS Exchange 2003 is not supported

Dual headquarters
Proprietary and Confidential © 2019 68
in Switzerland and Singapore
SQL and Exchange database recovery
SQL and Exchange database
recovery is possible:
from:
• application-aware backup
• database backup
to:
• functioning server
• local folder

Dual headquarters
Proprietary and Confidential © 2019 69
in Switzerland and Singapore
Recovery to new
hardware

Dual headquarters
Proprietary and Confidential © 2019 70
in Switzerland and Singapore
Start the computer with the Bootable Media

• Download bootable media from Backup


management console
• Boot the machine with the bootable media
• Click Manage this machine locally
• Bootable Media is a Linux-based media with
following functionality:
• Recovery
• Acronis Universal Restore
• File browser
• To invoke shell: Ctrl+Alt+F2

* Linux media will not detect RAID controllers and other


hardware with proprietary closed-source drivers

Dual headquarters
Proprietary and Confidential © 2019 71
in Switzerland and Singapore
Access to Cloud Storage backups
• Log in using credentials
• Alternatively: Use registration
code (OAuth2.0 Device Flow –
when credentials cannot be
specified by any reason)

LIMITATION: Starting from Acronis


Cyber Cloud 7.8 legacy versions of
Bootable Media will not be able to
recover from archives created by new
agents (v.7.8 and newer). Download
new bootable media after upgrade!

Dual headquarters
Proprietary and Confidential © 2019 72
in Switzerland and Singapore
Recover using Bootable Media
Once in the Bootable Media
interface, you can check the network
settings and proceed with recovery:

• Click Recover
• Select data…
• Click Browse
• Select backup folder or connect to Cloud
Storage with User Account credentials (it
will not show the backup yet)
• Select Destination
• If Linux machine had LVM disks, click
Apply RAID/LVM to recreate the
structure
• Choose disk layout
• Specify recovery options
• Click OK

Dual headquarters
Proprietary and Confidential © 2019 73
in Switzerland and Singapore
Apply universal restore
Fixes bootability of Windows and Linux machines
on dissimilar hardware or dissimilar hypervisor

Windows
Changes HAL.dll
Mass storage and network drivers to be provided
have to be in .inf, .sys or .oem formats

Linux
Adds modules for new hardware to initrd
Searches for necessary modules in \lib\modules
directory

Dual headquarters
Proprietary and Confidential © 2019 74
in Switzerland and Singapore
OAuth 2.0 for Bootable media
• OAuth2.0 Device Flow: when credentials cannot be
specified by any reason, Media can be registered under
backup service using special token
• Registration option appears at the first BootMedia dialog
• After registration, BootMedia don’t appear in the Backup
console
• The registration status is shown in the Welcome screen
• Once Bootable media is restarted, it’s being unregistered
automatically

Dual headquarters
Proprietary and Confidential © 2019 75
in Switzerland and Singapore
Monitoring

Dual headquarters
Proprietary and Confidential © 2019 76
in Switzerland and Singapore
Activities
Activities tab shows the list of activities for
• backup
• recovery
• replication
• retention rules
• validation

This data is created and stored locally on the agent


and is synced with the Backup Management
Server
For each activity you can download an XML log

Dual headquarters
Proprietary and Confidential © 2019 77
in Switzerland and Singapore
Centralized activity log
• Check:
 What happened
 When it happened
 How long it took

• Sort events by:


 Status
 Device name
 Date

Dual headquarters
Proprietary and Confidential © 2019 78
in Switzerland and Singapore
Alerts
An alert is raised whenever a problem is detected based on
recent log entry or device status

Following problems are automatically detected:


• Failures and errors
• Frozen tasks
• Queued backups
• Backups didn’t start as scheduled
• Backups in an unknown state
• Exceeded quotas
• Corrupt backups

Once a problem is no longer relevant, like a missed backup


being restarted, alerts are automatically deactivated, ensuring
only relevant issues are displayed

Limitation: notifications are not sent when an alert is raised

Dual headquarters
Proprietary and Confidential © 2019 79
in Switzerland and Singapore
Daily backup status reports

On account level, enable daily recap


to receive report on recent alerts:

The report:
• Is sent every morning at 10 AM
datacenter time
• Includes summary of all active alerts
at that moment
• Shows content of first 15 alerts

Dual headquarters
Proprietary and Confidential © 2019 80
in Switzerland and Singapore
System information
System information can be collected directly from the agent via the web console. It will contain:
• Agent logs folder
• System logs
• System-specific information
• Acronis registry/config files
• Disk configuration
• Network configuration
• Software installed
• Scheduler log (Linux, Mac)

Dual headquarters
Proprietary and Confidential © 2019 81
in Switzerland and Singapore
Certification Exam
Acronis is committed to provide world-class support to
its Service Providers and their End Users:
• To ensure high quality support to End Users and get free
support from Acronis, Service Provider must pass Tier 1
certification thus completing the support training course
• Support certification is individual and valid for 18 months.
All Acronis Certified Service Providers shall have a
minimum of two individual certified employees

Certification exams are available at:


https://kb.acronis.com/MSPtraining

Dual headquarters
Proprietary and Confidential © 2019 82
in Switzerland and Singapore
Benefits of becoming a certified SP

Dual headquarters
Proprietary and Confidential © 2019 83
in Switzerland and Singapore
www.acronis.org

CREATE, SPREAD
AND PROTECT
KNOWLEDGE WITH US!

Building new schools • Educating Former Inmates • Publishing books for children
Dual headquarters
Proprietary and Confidential © 2019 84
in Switzerland and Singapore

Vous aimerez peut-être aussi