7 Copyright © Acronis International GmbH, 2002-2015
9.3.1 Setting up a display mode .......................................................................................................................... 266
9.3.2 Configuring iSCSI and NDAS devices .......................................................................................................... 266
9.4 List of commands and utilities available in Linux-based bootable media .............................267
9.5 Acronis Startup Recovery Manager .......................................................................................268
9.6 Acronis PXE Server .................................................................................................................268
9.6.1 Acronis PXE Server Installation ................................................................................................................... 269
9.6.2 Setting up a machine to boot from PXE .................................................................................................... 269
9.6.3 Work across subnets ................................................................................................................................... 270
10 Disk management .................................................................................................. 271
10.1 Supported file systems ..........................................................................................................271
10.2 Basic precautions ...................................................................................................................271
10.3 Running Acronis Disk Director Lite ........................................................................................272
10.4 Choosing the operating system for disk management ..........................................................272
10.5 "Disk management" view ......................................................................................................273
10.6 Disk operations ......................................................................................................................273
10.6.1 Disk initialization .......................................................................................................................................... 274
10.6.2 Basic disk cloning ......................................................................................................................................... 274
10.6.3 Disk conversion: MBR to GPT ..................................................................................................................... 276
10.6.4 Disk conversion: GPT to MBR ..................................................................................................................... 277
10.6.5 Disk conversion: basic to dynamic ............................................................................................................. 277
10.6.6 Disk conversion: dynamic to basic ............................................................................................................. 278
10.6.7 Changing disk status .................................................................................................................................... 279
10.7 Volume operations ................................................................................................................279
10.7.1 Creating a volume ....................................................................................................................................... 279
10.7.2 Delete volume ............................................................................................................................................. 283
10.7.3 Set active volume ........................................................................................................................................ 284
10.7.4 Change volume letter ................................................................................................................................. 284
10.7.5 Change volume label ................................................................................................................................... 284
10.7.6 Format volume ............................................................................................................................................ 285
10.8 Pending operations ................................................................................................................286
11 Protecting applications with disk-level backup ........................................................ 287
11.1 Backing up an application server ...........................................................................................287
11.1.1 Locating database files ................................................................................................................................ 289
11.1.2 Truncating transaction logs ........................................................................................................................ 292
11.1.3 Best practices when backing up application servers ................................................................................ 295
11.2 Recovering SQL Server data ...................................................................................................297
11.2.1 Recovering SQL Server databases from a disk backup ............................................................................. 297
11.2.2 Accessing SQL Server databases from a disk backup ............................................................................... 298
11.2.3 Attaching SQL Server databases ................................................................................................................ 299
11.3 Recovering Exchange Server data ..........................................................................................299
11.3.1 Recovering Exchange Server database files from a disk backup ............................................................. 299
11.3.2 Mounting Exchange Server databases ...................................................................................................... 300
11.3.3 Granular recovery of mailboxes ................................................................................................................. 300
11.4 Recovering Active Directory data ..........................................................................................301
11.4.1 Recovering a domain controller (other DCs are available) ...................................................................... 301
11.4.2 Recovering a domain controller (no other DCs are available) ................................................................. 302
11.4.3 Restoring the Active Directory database ................................................................................................... 303
11.4.4 Restoring accidentally deleted information .............................................................................................. 304
11.4.5 Avoiding a USN rollback .............................................................................................................................. 304