8 Copyright © Acronis International GmbH, 2002-2015
12 Protecting Microsoft SQL Server with single-pass backup ........................................ 305
12.1 General information ..............................................................................................................305
12.1.1 Agent for SQL ............................................................................................................................................... 305
12.1.2 Supported operating systems .................................................................................................................... 306
12.1.3 Supported Microsoft SQL Server versions ................................................................................................. 306
12.1.4 Permissions for SQL Server backup and recovery .................................................................................... 306
12.1.5 What else you need to know about single-pass backup .......................................................................... 307
12.2 Installation of Agent for SQL ..................................................................................................308
12.3 Backing up Microsoft SQL server ...........................................................................................308
12.3.1 Single-pass backup settings ........................................................................................................................ 309
12.4 Recovering Microsoft SQL Server data ..................................................................................310
12.4.1 Recovering SQL databases to instances .................................................................................................... 310
12.4.2 Extracting the database files to folders ..................................................................................................... 312
12.5 Mounting SQL Server databases from a single-pass backup .................................................313
12.5.1 Unmounting mounted SQL Server databases ........................................................................................... 313
12.6 Protecting clustered SQL Server instances and AAG .............................................................314
13 Protecting Microsoft Active Directory with single-pass backup ................................ 316
13.1 Agent for Active Directory .....................................................................................................316
13.2 Supported operating systems ................................................................................................316
13.3 Installation of Agent for Active Directory ..............................................................................316
13.4 Backing up Microsoft Active Directory ..................................................................................317
13.5 Recovering Microsoft Active Directory ..................................................................................317
13.5.1 Re-promoting the domain controller ........................................................................................................ 318
13.5.2 Recovering the Active Directory data from a single-pass backup ........................................................... 318
14 Administering a managed machine ......................................................................... 320
14.1 Backup plans and tasks ..........................................................................................................320
14.1.1 Actions on backup plans and tasks ............................................................................................................ 320
14.1.2 States and statuses of backup plans and tasks ......................................................................................... 322
14.1.3 Export and import of backup plans ............................................................................................................ 324
14.1.4 Deploying backup plans as files .................................................................................................................. 328
14.1.5 Backup plan details ..................................................................................................................................... 329
14.1.6 Task/activity details ..................................................................................................................................... 330
14.2 Log ..........................................................................................................................................330
14.2.1 Actions on log entries.................................................................................................................................. 331
14.2.2 Log entry details .......................................................................................................................................... 331
14.3 Alerts ......................................................................................................................................332
14.4 Changing a license .................................................................................................................333
14.5 Collecting system information ...............................................................................................334
14.6 Adjusting machine options ....................................................................................................334
14.6.1 Additional settings....................................................................................................................................... 334
14.6.2 Acronis Customer Experience Program ..................................................................................................... 335
14.6.3 Alerts ............................................................................................................................................................ 335
14.6.4 E-mail settings ............................................................................................................................................. 336
14.6.5 Event tracing ................................................................................................................................................ 337
14.6.6 Log cleanup rules ......................................................................................................................................... 339
14.6.7 Machine management................................................................................................................................ 340
14.6.8 Cloud backup proxy ..................................................................................................................................... 340