Acronis Backup 12.5 Update 4

Acronis Backup 12.5 Update 4

Acronis Backup 12.5 Update 4 PANDUAN PENGGUNA Table of contents 1 Yang baru di Acronis Backup ............................................................................................8 1.1 Yang baru di Pembaruan 4 ......................................................................................................... 8 1.2 Yang baru di Pembaruan 3.2 ...................................................................................................... 9 1.3 Yang baru di Pembaruan 3.1 ...................................................................................................... 9 1.4 Yang baru di Pembaruan 3 .......................................................................................................10 1.5 Yang baru di Pembaruan 2 .......................................................................................................11 1.6 Yang baru di Pembaruan 1 .......................................................................................................13 1.7 Yang baru di Acronis Backup 12.5 ............................................................................................13 2 Instalasi ......................................................................................................................... 15 2.1 Instalasi ....................................................................................................................................15 2.2 Komponen................................................................................................................................17 2.3 Persyaratan perangkat lunak ...................................................................................................20 2.3.1 Browser web yang didukung ........................................................................................................................ 20 2.3.2 Sistem operasi dan lingkungan yang Didukung .......................................................................................... 20 2.3.3 Versi Microsoft SQL Server yang didukung ................................................................................................. 25 2.3.4 Versi Microsoft Exchange Server yang didukung ........................................................................................ 25 2.3.5 Versi Microsoft SharePoint yang didukung ................................................................................................. 25 2.3.6 Versi Database Oracle yang didukung ......................................................................................................... 26 2.3.7 Platform virtualisasi yang didukung ............................................................................................................. 26 2.3.8 Paket Linux ..................................................................................................................................................... 29 2.3.9 Kompatibilitas dengan perangkat lunak enkripsi........................................................................................ 31 2.4 Persyaratan sistem ..................................................................................................................32 2.5 Sistem file yang didukung ........................................................................................................34 2.6 Penyebaran di lokasi ................................................................................................................36 2.6.1 Menginstal server manajemen .................................................................................................................... 36 2.6.2 Menambahkan mesin melalui antarmuka web .......................................................................................... 41 2.6.3 Menginstal agen secara lokal ....................................................................................................................... 46 2.6.4 Instalasi atau penghapusan instalasi tanpa pengawasan .......................................................................... 50 2.6.5 Memeriksa pembaruan perangkat lunak .................................................................................................... 57 2.6.6 Mengelola lisensi ........................................................................................................................................... 58 2.7 Penyebaran awan ....................................................................................................................59 2.7.1 Mengaktifkan akun ....................................................................................................................................... 59 2.7.2 Persiapan ....................................................................................................................................................... 59 2.7.3 Pengaturan server proksi .............................................................................................................................. 60 2.7.4 Menginstal agen ............................................................................................................................................ 62 2.8 Menyebarkan Agen untuk VMware (Perlengkapan Virtual) dari templat OVF .......................64 2.8.1 Sebelum Anda memulai ................................................................................................................................ 64 2.8.2 Menyebarkan templat OVF .......................................................................................................................... 65 2.8.3 Mengonfigurasi alat virtual .......................................................................................................................... 65 2.8.4 Memutakhirkan Agent for VMware (Perlengkapan Virtual) ..................................................................... 67 2.9 Menyebarkan agen melalui Kebijakan Grup............................................................................67 2.10 Memperbarui agen ..................................................................................................................69 2.11 Menghapus instalasi produk ....................................................................................................69 2 Copyright © Acronis International GmbH, 2003-2019 3 Mengakses konsol pencadangan .................................................................................... 71 3.1 Mengonfigurasi browser web untuk Autentikasi Windows Terintegrasi ................................72 3.1.1 Menambahkan konsol ke daftar situs intranet lokal .................................................................................. 72 3.1.2 Menambahkan konsol ke daftar situs tepercaya........................................................................................ 74 3.2 Mengubah pengaturan sertifikat SSL.......................................................................................77 4 Tampilan konsol pencadangan ....................................................................................... 78 5 Cadangan ...................................................................................................................... 79 5.1 Referensi cepat rencana pencadangan ...................................................................................81 5.2 Memilih data yang akan dicadangkan .....................................................................................84 5.2.1 Memilih file/folder ........................................................................................................................................ 84 5.2.2 Memilih status sistem ................................................................................................................................... 85 5.2.3 Memilih disk/volume .................................................................................................................................... 86 5.2.4 Memilih konfigurasi ESXi .............................................................................................................................. 88 5.3 Memilih tujuan ........................................................................................................................89 5.3.1 Tentang Secure Zone .................................................................................................................................... 91 5.3.2 Tentang Acronis Cyber Infrastructure ......................................................................................................... 93 5.4 Jadwal ......................................................................................................................................94 5.4.1 Jadwalkan berdasarkan event ...................................................................................................................... 96 5.4.2 Persyaratan untuk memulai ......................................................................................................................... 98 5.5 Aturan retensi ........................................................................................................................103 5.6 Enkripsi...................................................................................................................................104 5.7 Notarisasi ...............................................................................................................................106 5.8 Konversi ke mesin virtual .......................................................................................................107

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    317 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us