A SERVICE OF

logo

8.1.4 Setting up one-time execution............................................................................................................. 75
8.2 MANAGING SCHEDULED TASKS................................................................................................................... 76
CHAPTER 9. MANAGING ACRONIS SECURE ZONE ............................................................................. 77
9.1 CREATING ACRONIS SECURE ZONE ............................................................................................................ 77
9.2 RESIZING ACRONIS SECURE ZONE .............................................................................................................. 78
9.3 DELETING ACRONIS SECURE ZONE............................................................................................................. 78
CHAPTER 10. CREATING BOOTABLE MEDIA........................................................................................ 80
CHAPTER 11. OTHER OPERATIONS ......................................................................................................... 83
11.1 VALIDATING BACKUP ARCHIVES............................................................................................................... 83
11.2 OPERATION RESULTS NOTIFICATION ......................................................................................................... 83
11.2.1 Email notification............................................................................................................................. 84
11.2.2 WinPopup notification...................................................................................................................... 84
11.3 VIEWING LOGS.......................................................................................................................................... 85
11.4 EVENT TRACING........................................................................................................................................ 86
11.4.1 Windows event log............................................................................................................................ 86
11.4.2 SNMP notifications........................................................................................................................... 86
11.5 MANAGING SYSTEM RESTORE.................................................................................................................. 86
CHAPTER 12. MOUNTING AN IMAGE AS A VIRTUAL DRIVE............................................................ 88
12.1 MOUNTING AN IMAGE............................................................................................................................... 88
12.2 UNMOUNTING AN IMAGE .......................................................................................................................... 90
CHAPTER 13. TRANSFERRING THE SYSTEM TO A NEW DISK......................................................... 91
13.1 GENERAL INFORMATION ........................................................................................................................... 91
13.2 SECURITY.................................................................................................................................................. 92
13.3 EXECUTING TRANSFERS ............................................................................................................................ 92
13.3.1 Selecting Clone mode....................................................................................................................... 92
13.3.2 Selecting source disk ........................................................................................................................ 92
13.3.3 Selecting destination disk................................................................................................................. 93
13.3.4 Partitioned destination disk.............................................................................................................. 94
13.3.5 Old and new disk partition layout .................................................................................................... 94
13.3.6 Old disk data .................................................................................................................................... 94
13.3.7 Destroying the old disk data............................................................................................................. 95
13.3.8 Selecting partition transfer method.................................................................................................. 96
13.3.9 Partitioning the old disk................................................................................................................... 97
13.3.10 Old and new disk partition layouts................................................................................................. 97
13.3.11 Cloning summary ........................................................................................................................... 98
13.4 CLONING WITH MANUAL PARTITIONING.................................................................................................... 98
13.4.1 Old and new disk partition layouts................................................................................................... 98
CHAPTER 14. ADDING A NEW HARD DISK........................................................................................... 100
14.1 SELECTING A HARD DISK......................................................................................................................... 100
14.2 CREATING NEW PARTITIONS.................................................................................................................... 100
14.3 DISK ADD SUMMARY............................................................................................................................... 101
CHAPTER 15. COMMAND-LINE MODE AND SCRIPTING.................................................................. 102
15.1 WORKING IN THE COMMAND-LINE MODE................................................................................................ 102
15.1.1 Supported commands ..................................................................................................................... 102
15.1.2 trueimagecmd.exe usage examples................................................................................................. 107
15.1.3 Command-line mode usage under DOS ......................................................................................... 108
15.2 SCRIPTING............................................................................................................................................... 108
15.2.1 Script execution parameters........................................................................................................... 108
15.2.2 Script structure............................................................................................................................... 109
15.2.3 Script usage examples .................................................................................................................... 109
6 Copyright © Acronis, Inc., 2000-2006