ATI2019 Userguide en-US
ATI2019 Userguide en-US
USER GUIDE
Table of contents
1 Introduction ....................................................................................................................7
1.1 What is Acronis® True Image™? ................................................................................................7
1.2 New in this version ....................................................................................................................7
1.3 System requirements and supported media .............................................................................8
1.3.1 Minimum system requirements .................................................................................................................... 8
1.3.2 Supported operating systems ........................................................................................................................ 8
1.3.3 Supported file systems.................................................................................................................................... 9
1.3.4 Supported Internet connection types ........................................................................................................... 9
1.3.5 Supported storage media ............................................................................................................................. 10
1.4 Installing Acronis True Image 2019..........................................................................................10
1.5 Activating Acronis True Image 2019 ........................................................................................11
1.6 Trial version information .........................................................................................................13
1.7 Upgrading Acronis True Image 2019 .......................................................................................13
1.8 Technical Support ....................................................................................................................14
2 Getting started .............................................................................................................. 15
2.1 User interface language ...........................................................................................................15
2.2 Protecting your system ............................................................................................................15
2.2.1 Step 1. Backing up your computer ............................................................................................................... 16
2.2.2 Step 2. Creating bootable media.................................................................................................................. 17
2.3 Backing up all data on your PC ................................................................................................18
2.4 Creating an Acronis Survival Kit ...............................................................................................19
2.5 Backing up your files ................................................................................................................21
2.6 Cloning your hard drive ...........................................................................................................22
2.7 Recovering your computer ......................................................................................................23
2.8 Recovering your files and folders ............................................................................................25
2.9 Acronis account .......................................................................................................................25
2.10 Getting started with Acronis Cloud .........................................................................................26
2.10.1 How we ensure security of your data .......................................................................................................... 26
2.10.2 Subscription information .............................................................................................................................. 27
3 Basic concepts ............................................................................................................... 28
3.1 Basic concepts..........................................................................................................................28
3.2 The difference between file backups and disk/partition images ............................................29
3.3 Full, incremental and differential backups ..............................................................................31
3.4 FAQ about backup, recovery and cloning ................................................................................33
3.5 Deciding where to store your backups ....................................................................................34
3.5.1 Preparing a new disk for backup .................................................................................................................. 35
3.5.2 FTP connection .............................................................................................................................................. 35
3.5.3 Authentication settings................................................................................................................................. 36
3.6 Using Acronis Nonstop Backup ................................................................................................36
3.6.1 Acronis Nonstop Backup data storage ........................................................................................................ 38
3.6.2 Nonstop Backup - Frequently asked questions........................................................................................... 38
Backups allow you to recover your computer system should a disaster occur, such as losing data,
accidentally deleting critical files or folders, or suffering a complete hard disk crash.
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected
even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a
new device, if needed.
Key features:
Disk backup to a local storage and to Acronis Cloud (p. 42)
File backup to a local storage and to Acronis Cloud (p. 44)
Rescue bootable media (p. 140)
Hard disk cloning (p. 131)
Data archiving (p. 111)
Family data protection (p. 115)
File synchronization (p. 125)
Security and privacy tools (p. 139)
Getting started
Learn how to protect your computer with two simple steps: "Protecting your system (p. 15)".
** Limited support. Some features may not work properly. For example, Online Dashboard and
Archiving.
Acronis True Image 2019 also lets you create a bootable CD-R/DVD-R or USB drive that can back up
and recover a disk/partition on a computer running any Intel- or AMD- based PC operating system,
including Linux®. Note that the Intel-based Apple Macintosh is not supported.
Warning! Successful recovery is only guaranteed for the supported operating systems. Other operating systems
can be backed up using a sector-by-sector approach, but they may become unbootable after recovery.
** File systems are supported only for disk or partition recovery operations (without resizing).
If a file system is not supported or is corrupted, Acronis True Image 2019 can copy data using a
sector-by-sector approach.
Product activation + -* - - -
Product update + - ** - - -
* - You can activate the product by using an activation code. Refer to the Activation from another
computer section in Activating Acronis True Image 2019 (p. 11) for details.
** - To update the product, download the newer product version from the Acronis website and
install it over your current one.
The firewall settings of the source computer should have Ports 20 and 21 opened for the TCP and
UDP protocols to function. The Routing and Remote Access Windows service should be disabled.
If you use Windows 10, click Start -> Settings -> System -> Apps & features -> Acronis True Image
2019 -> Uninstall.
If you use Windows 8, click the Settings icon, then select Control Panel -> Uninstall a program ->
Acronis True Image 2019 -> Uninstall.
If you use Windows 7, click Start -> Control Panel -> Uninstall a program -> Acronis True Image 2019
-> Uninstall.
If you used the Acronis Secure Zone or Acronis Nonstop Backup (p. 36), select in the window that appears what
to do with the zone and Nonstop Backup storages.
Please keep in mind that the backups created by the later program version may be incompatible with
the previous program versions. Therefore, if you roll back Acronis True Image to an older version, you
likely will have to re-create the backups using the older version. We strongly recommend that you
create new bootable media after each product upgrade.
If your computer is connected to the Internet, the product will be activated automatically.
If the computer where you install Acronis True Image 2019 does not have Internet connection or if
the program cannot connect to Acronis Activation Server, click Account on the sidebar, and then
select one of the following actions:
If your computer is not connected to the Internet, you may activate Acronis True Image 2019 by
using another computer which has connection to the Internet.
Your backups created with a previous version of Acronis True Image are completely compatible with
the newer product version. After you upgrade, all of your backups will automatically be added to
your backup list.
We strongly recommend that you create new bootable media after each product upgrade.
Built-in store
Acronis True Image 2019 provides an in-app store. Using this store, you can:
Buy the full version of Acronis True Image 2019.
Buy Acronis True Image subscription.
Buy more storage space on Acronis Cloud.
To access the in-app store, go to the Account tab, and then click Acronis Store. You will see the
in-app store and all available purchase options.
Product Updates
You can download the latest updates for all your registered Acronis software products from our
website at any time after logging into your Account (https://account.acronis.com/) and registering
the product. See Registering Acronis Products at the Website
(https://kb.acronis.com/content/4834) and Acronis Website User Guide
(https://kb.acronis.com/content/8128).
It is recommended to test the rescue media as described in Making sure that your rescue media
can be used when needed (p. 146).
Remember, the first backup version (the full backup version) is the most important. It is the biggest
one, because it contains all data stored on the disk. Further backup versions (the incremental and
differential backup versions) may be organized in different schemes. These versions contain only
data changes. That’s why they are dependent on the full backup version and why the full backup
version is so important.
By default, a disk backup is created by using the incremental scheme. This scheme is optimal, in most
cases.
For advanced users: it is a good idea to create 2-3 full backup versions and store them on different storage
devices. This method is much more reliable.
When you select Entire PC as a backup type, Acronis True Image backs up all your internal hard drives
in disk mode. The backup contains the operating system, installed programs, system settings, and all
your personal data including your photos, music, and documents.
The recovery from an Entire PC backup is also simplified. You only need to choose the date to which
you want to revert your data. Acronis True Image recovers all data from the backup to the original
location. Note that you cannot select specific disks or partitions to recover and you cannot change
the default destination. If you need to avoid these limitations, we recommend that you back up your
data with an ordinary disk-level backup method. Refer to Backing up disks and partitions (p. 42) for
details.
You can also recover specific files and folders from an Entire PC backup. Refer to Backing up files and
folders (p. 44) for details.
If an Entire PC backup contains dynamic disks, you recover your data in partition mode. This means
that you can select partitions to recover and change recovery destination. Refer to About recovery of
dynamic/GPT disks and volumes (p. 94) for details.
6. [optional step] Click Options to set the options for the backup, including Schedule (p. 53),
Scheme (p. 56), and Password protection (p. 65). For more information see Backup options (p.
52).
7. Click Back up now.
When you back up your data to Acronis Cloud, the first backup may take a considerable amount of time to
complete. Further backup processes will likely be much faster, because only changes to files will be transferred
over the Internet.
4. On the Destination Disk step, select the destination disk for the cloned data.
If any disk is unpartitioned, the program will automatically recognize it as the destination and bypass this
step.
5. On the Finish step, ensure that the configured settings suit your needs, and then click Proceed.
By default, Acronis True Image 2019 shuts down the computer after the clone process finishes. This
enables you to change the position of master/subordinate jumpers and remove one of the hard
drives.
1. Connect Acronis bootable media to your computer, and then run the special standalone version
of Acronis True Image 2019 (p. 192).
Refer to Step 2 Creating bootable rescue media (p. 17) and Arranging boot order in BIOS (p. 96)
for details.
2. On the Welcome screen, select My disks below Recover.
3. Select the system disk backup to be used for recovery. Right-click the backup and choose
Recover.
When the backup is not displayed, click Browse and manually specify the path to the backup. In
the same window, you can connect to Acronis Cloud and select an online backup. Refer to
Recovering your system from Acronis Cloud (p. 102) for details.
4. At the Recovery method step, select Recover whole disks and partitions.
Remote storage
On the one hand, Acronis Cloud is a secure remote storage which you can use to store:
Backups of your files and folders
Backups of your partitions and disks
Versions of your synchronized files and folders
Because files are stored on a remote storage, they are protected even if your computer is stolen or
your house burns down. In the case of a disaster or data corruption, you can recover your files and
even the entire contents of your computer.
With one account, you can save data from several computers and all your mobile devices running iOS
and Android operating systems. Refer to Acronis Mobile for details.
To start using Acronis Cloud, you need a subscription to the service. Refer to Subscription
information for details.
Web application
On the other hand, Acronis Cloud is a web application that allows you to recover and manage the
data you store on Acronis Cloud. To work with the application, you can use any computer connected
to the Internet.
Trial version
When you activate the trial version of the product, a 1000 GB storage and 30-day free subscription to
Acronis Cloud is assigned to your account automatically. See details in Trial version information (p.
13).
Full version
You can purchase the full Acronis Cloud subscription in the Account section of your version of
Acronis True Image or at the Acronis website. See details in Upgrading Acronis True Image 2019 (p.
13).
Recovery methods:
Full recovery can be performed to the original location or to a new one.
When the original location is selected, the data in the location is completely overwritten with the
data from the backup. In case of a new location, the data is just copied to the new location from
the backup.
Incremental recovery is performed only to the original location and only from a cloud backup.
Before the recovery starts, the files in the original location are compared with the files in the
backup by file attributes, such as file size and date of last modification. Those files that do not
match are marked for recovery, the remaining files will be skipped during recovery. In that way,
as opposed to the full recovery, Acronis True Image recovers only changed files. This method
significantly reduces the recovery time and saves Internet traffic while recovering from Acronis
Cloud.
Backup versions
Backup versions are the file or files created during each backup operation. The number of versions
created is equal to the number of times the backup is executed. So, a version represents a point in
time to which the system or data can be restored.
The backup versions are similar to file versions. The file versions concept is familiar to those who use
a Windows feature called "Previous versions of files". This feature allows you to restore a file as it
existed on a particular date and time. A backup version allows you to recover your data in a similar
way.
Disk cloning
This operation copies the entire contents of one disk drive to another disk drive. This may be
necessary, for example, when you want to clone your operating system, applications, and data to a
new larger capacity disk. You can do it two ways:
Use the Clone disk utility.
Back up your old disk drive, and then recover it to the new one.
Backup file format
Acronis True Image usually saves backup data in the proprietary tib format using compression. The
data from .tib file backups can be recovered only through Acronis True Image, in Windows or in the
recovery environment.
Acronis Nonstop Backup uses a special hidden storage for data and metadata. The backed up data is
compressed and split into files of about 1 GB. These files also have a proprietary format and the data
they contain can be recovered only with the help of Acronis True Image.
Backup validation
The backup validation feature allows you to confirm that your data can be recovered. The program
adds checksum values to the data blocks being backed up. During backup validation, Acronis True
Image opens the backup file, recalculates the checksum values and compares those values with the
stored ones. If all compared values match, the backup file is not corrupted.
Scheduling
For your backups to be really helpful, they must be as "up-to-date" as possible. Schedule your
backups to run automatically and on a regular basis.
Deleting backups
When you want to delete backups and backup versions you no longer need, please do it by using the
tools provided by Acronis True Image 2019. Refer to Deleting backups and backup versions (p. 79) for
details.
Acronis True Image 2019 stores information on the backups in a metadata information database.
Therefore, deleting unneeded backup files in File Explorer will not delete information about these
backups from the database. This will result in errors when the program tries to perform operations
on the backups that no longer exist.
Acronis True Image 2019 excludes the following files from a disk backup:
pagefile.sys
hiberfil.sys (a file that keeps RAM contents when the computer goes into hibernation)
You can change this default method by turning on the sector-by-sector mode. In this case, Acronis
True Image 2019 copies all hard disk sectors, and not only those that contain data.
Additionally, when you back up your system partition or disk to Acronis Cloud, Acronis True Image
excludes the following data:
The Temp folders, usually located in:
C:\Windows\Temp\
C:\Users\<username>\AppData\Local\Temp
The System Volume Information folder (usually located in C:\System Volume Information\)
The Recycle Bin
Web browser temporary data:
Temporary Internet files
Cookies
History
Cache
.tib files
.tmp files
.~ files
Full method
The result of a full method backup operation (also known as full backup version) contains all of the
data at the moment of the backup creation.
Example: Every day, you write one page of your document and back it up using the full method.
Acronis True Image saves the entire document every time you run backup.
Additional information
A full backup version forms a base for further incremental or differential backups. It can also be used
as a standalone backup. A standalone full backup might be an optimal solution if you often roll back
the system to its initial state or if you do not like to manage multiple backup versions.
Recovery: In the example above, to recover the entire work from the 4.tib file, you need to have only
one backup version—4.tib.
Incremental method
The result of an incremental method backup operation (also known as incremental backup version)
contains only those files which have been changed since the LAST BACKUP.
Example: Every day, you write one page of your document and back it up using the incremental
method. Acronis True Image saves the new page every time you run backup.
Note: The first backup version you create always uses full method.
1.tib—file of full backup version.
Additional information
Incremental method is the most useful when you need frequent backup versions and the ability to
roll back to a specific point in time. As a rule, incremental backup versions are considerably smaller
than full or differential versions. On the other hand, incremental versions require more work for the
program to provide recovery.
Recovery: In the example above, to recover the entire work from the 4.tib file, you need to have all
the backup versions—1.tib, 2.tib, 3.tib, and 4.tib. Therefore, if you lose an incremental backup
version or it becomes corrupted, all later incremental versions are unusable.
Differential method
The result of a differential method backup operation (also known as differential backup version)
contains only those files which have been changed since the LAST FULL BACKUP.
Example: Every day, you write one page of your document and back it up using the differential
method. Acronis True Image saves the entire document except the first page stored in the full backup
version.
Note: The first backup version you create always uses full method.
1.tib—file of full backup version.
2.tib, 3.tib, 4.tib—files of differential backup versions.
Differential method is an intermediate between the first two approaches. It takes less time and space
than "Full", but more than "Incremental". To recover data from a differential backup version, Acronis
True Image needs only the differential version and the last full version. Therefore, recovery from a
differential version is simpler and more reliable than recovery from an incremental one.
Recovery: In the example above, to recover the entire work from the 4.tib file, you need to have two
backup versions—1.tib and 4.tib.
To choose a desired backup method, you usually need to configure a custom backup scheme. For
more information see Custom schemes (p. 58).
An incremental or differential backup created after a disk is defragmented might be considerably larger than
usual. This is because the defragmentation program changes file locations on the disk and the backups reflect
these changes. Therefore, it is recommended that you re-create a full backup after disk defragmentation.
The table below shows possible backup destinations for your data.
HDD (internal or
SMB/NFS share
USB flash drive
Network share
Acronis Cloud
Memory card
FTP server
external)
external)
or NDAS
DVD
MBR partitions or + + + + + + + + + +
entire disks (HDD, SSD)
GPT/dynamic volumes + + + + + + + + + +
or disks
Files and folders + + + + + + + + + +
Though backing up to your local hard drive is the simplest option, we recommend that you store your
backups off-site because it enhances the security of your data.
To create a new FTP connection, when selecting a backup storage click FTP connection, and in the
opened window provide:
Path to the FTP server, for example: my.server.com
The created FTP connection will appear in the folder tree. Select the connection and browse for the
backup storage that you want to use.
Please, be aware that the mere opening of an FTP server's root folder does not bring you to your home
directory.
Acronis True Image 2019 splits a backup into files with a size of 2GB when backing up directly to an FTP server.
If you back up to a hard disk with the aim of transferring the backup to an FTP later, split the backup into files of
2GB each by setting the desired file size in the backup options. Otherwise, the recovery will not be possible.
An FTP server must allow passive mode file transfers.
The firewall settings of the source computer should have Ports 20 and 21 opened for the TCP and UDP protocols
to function. The Routing and Remote Access Windows service should be disabled.
If necessary, specify the user name and password, and then click Test connection. When the test is
successfully passed, click Connect.
Troubleshooting
When you create a network share that you plan to use as a backup storage, please ensure that at
least one of the following conditions is met:
Windows account has a password on the computer where the shared folder is located.
Password-protected sharing is turned off in Windows.
You can find this setting at Control Panel —> Network and Internet —> Network and Sharing
Center —> Advanced sharing settings —> Turn off password protected sharing.
Otherwise, you will not be able to connect to the shared folder.
The main purpose of Acronis Nonstop Backup is continuous protection of your data (files, folders,
contacts, etc.), though you can use it to protect partitions as well. If you choose to protect an entire
partition, you will be able to recover the partition as a whole using the image recovery procedure.
Acronis Nonstop Backup checks file changes on the disk, not in the memory. If, for instance, you are
working in Word and do not use the "Save" operation for a long time, your current changes in the
Word document will not be backed up.
You may think that at these backup rates the storage will fill in no time. Do not worry as Acronis True
Image 2019 will back up only so called "deltas". This means that only differences between old and
new versions will be backed up and not whole changed files. For example, if you use Microsoft
Outlook or Windows Mail, your pst file may be very large. Furthermore, it changes with each
received or sent E-mail message. Backing up the entire pst file after each change would be an
unacceptable waste of your storage space, so Acronis True Image 2019 backs up only its changed
parts in addition to the initially backed up file.
Retention rules
Local backups
Acronis Nonstop Backup keeps all backups for the last 24 hours. The older backups will be
consolidated in such a way that Nonstop Backup will keep daily backups for the last 30 days and
weekly backups until all Nonstop Backup data destination space is used.
The consolidation will be performed every day between midnight and 01:00 AM. The first
consolidation will take place after the Nonstop Backup has been working for at least 24 hours. For
example, you have turned on the Nonstop Backup at 10:00 AM on July 12. In this case the first
consolidation will be performed between 00:00 and 01:00 AM on July 14. Then the program will
consolidate the data every day at the same time. If your computer is turned off between 00:00 and
01:00 AM, the consolidation will start when you turn the computer on. If you turn off Nonstop
Backup for some time, the consolidation will start after you turn it on again.
Cloud backups
Acronis True Image 2019 keeps only the following backup versions:
All versions for the last hour
The first versions of every hour for the last 24 hours
In many cases an external hard disk will be the best choice for Nonstop Backup data storage. You can
use an external disk with any of the following interfaces: USB (including USB 3.0), eSATA, FireWire,
and SCSI.
You can also use an NAS as the storage, but with one limitation - it must be accessible with the SMB
protocol. It does not matter whether an NAS share you want to use for the storage is mapped as a
local disk or not. If the share requires login, you will need to provide the correct user name and
password. For more information see Authentication settings (p. 36). Acronis True Image 2019
remembers the credentials and the subsequent connections to the share do not require login.
When an external hard disk or NAS is unavailable, the Nonstop Backup destination can be an internal
disk, including a dynamic one. Please note that you cannot use a partition to be protected as a
Nonstop Backup storage. If your computer has a single hard disk drive with a single partition, but you
want to use Acronis Nonstop Backup anyway, you can create Acronis Secure Zone and use it as the
Nonstop Backup data storage.
Before creating Acronis Nonstop Backup data storage, Acronis True Image 2019 checks whether the
selected destination has enough free space. It multiplies the volume of data to be protected by 1.2
and compares the calculated value with the available space. If the free space on the destination
satisfies this minimum storage size criterion, the destination can be used for storing Nonstop Backup
data.
In such a case Nonstop Backup automatically pauses and you cannot restart it. After pausing, Acronis
Nonstop Backup gives the system one hour to relieve the load and then attempts to restart.
The automatic restart count for Acronis Nonstop Backup is 6. This means that after the first
automatic restart Acronis Nonstop Backup will attempt to restart five more times with intervals of
exactly one hour between attempts.
After the sixth unsuccessful attempt, Acronis Nonstop Backup will wait for the next calendar day. On
the next day the automatic restart count will automatically reset. When not interfered with, Acronis
Nonstop Backup performs six restart attempts per day.
The restart attempt count can be reset by doing any of the following:
Restarting Acronis Nonstop Backup service;
Rebooting the computer will reset the load and the restart count. If the system overloads again,
Acronis Nonstop Backup will pause.
Why does Acronis Nonstop Backup sometimes cause a high CPU load? - This is the expected
behavior of Acronis Nonstop Backup. This may happen on restart of a paused Acronis Nonstop
Backup if a considerable amount of protected data has been modified during the pause.
For example, if you manually pause the Acronis Nonstop Backup that you use for protecting your
system partition and then install a new application. When you restart Acronis Nonstop Backup, it
loads the CPU for some time. However, the process (afcdpsrv.exe) then goes back to normal.
This happens because Acronis Nonstop Backup needs to check the backed up data against the data
that have been modified during the pause to ensure protection continuity. If there was a
considerable amount of data modified, the process may load CPU for some time. After the check is
done and all the modified data is backed up, Acronis Nonstop Backup goes back to normal.
Can I have Acronis Nonstop Backup storage on an FAT32 partition of a local hard disk? - Yes, FAT32
and NTFS partitions can be used as the storage.
Can I set up Acronis Nonstop Backup storage on a network share or NAS? - Yes, Acronis Nonstop
Backup supports network shares, mapped drives, NAS and other network attached devices with one
limitation - they must use the SMB protocol.
To view a tooltip indicating the operation's progress or state, point to the icon.
To view status, change priority or cancel a current operation, right-click the icon, and then click
the corresponding command.
Shortcut menu commands
To access shortcut menu commands, open File Explorer, right-click selected items, point to Acronis
True Image, and then select a command.
To create a new file-level backup, select New file backup.
To create a new disk-level backup, select New disk backup.
To mount a disk-level backup (.tib file), select Mount.
To validate a backup (.tib file), select Validate.
File-level recovery in File Explorer
To recover files and folders:
1. In File Explorer, double-click the backup file (.tib file) that contains the data to recover.
3.9 Wizards
When you use the available Acronis True Image 2019 tools and utilities, the program will in many
cases employ wizards to guide you through the operations.
7. Click the Backup destination area, and then select a destination for backup:
Acronis Cloud—Sign in to your Acronis account, and then click OK.
If you do not have an Acronis account, click Create account, type your email address,
password, and then click the Create account button. Refer to Acronis account (p. 25) for
details.
Your external drive—When an external drive is plugged into your computer, you can select it
from the list.
NAS—Select an NAS from the list of found NAS devices. If you have only one NAS, Acronis
True Image 2019 will suggest using it as a backup destination by default.
Browse—Select a destination from the folder tree.
If possible, avoid storing your system partition backups on dynamic disks, because the system partition is
recovered in the Linux environment. Linux and Windows work with dynamic disks differently. This may
result in problems during recovery.
8. [optional step] Click Options to set the options for the backup, including Schedule (p. 53),
Scheme (p. 56), and Password protection (p. 65). For more information see Backup options (p.
52).
9. [optional step] Click the Add a comment icon, and then type a comment to the backup version.
Backup comments will help you to find the necessary version later, when recovering your data.
10. Perform one of the following:
To run the backup immediately, click Back up now.
To run the backup later or on a schedule, click the arrow to the right of the Back up now
button, and then click Later.
When you back up your data to Acronis Cloud, the first backup may take a considerable amount of time to
complete. Further backup processes will likely be much faster, because only changes to files will be transferred
over the Internet.
7. Click the Backup destination area, and then select a destination for backup:
Acronis Cloud—Sign in to your Acronis account, and then click OK.
If you do not have an Acronis account, click Create account, type your email address,
password, and then click the Create account button. Refer to Acronis account (p. 25) for
details.
Your external drive—When an external drive is plugged into your computer, you can select it
from the list.
7. Click the Backup destination area, and then select a destination for backup:
Acronis Cloud—Sign in to your Acronis account, and then click OK.
If you do not have an Acronis account, click Create account, type your email address,
password, and then click the Create account button. Refer to Acronis account (p. 25) for
details.
Your external drive—When an external drive is plugged into your computer, you can select it
from the list.
NAS—Select an NAS from the list of found NAS devices. If you have only one NAS, Acronis
True Image 2019 will suggest using it as a backup destination by default.
Browse—Select a destination from the folder tree.
8. [optional step] Click Options to set the options for the backup, including Schedule (p. 53),
Scheme (p. 56), and Password protection (p. 65). For more information see Backup options (p.
52).
To exclude files with a digital signature from the backup, select the Do not notarize digitally
signed files check box on the Exclusions tab. Refer to Excluding items from backup (p. 63) for
details.
9. [optional step] Click the Add a comment icon, and then type a comment to the backup version.
Backup comments will help you to find the necessary version later, when recovering your data.
10. Perform one of the following:
To run the backup immediately, click Back up now.
To run the backup later or on a schedule, click the down arrow to the right of the Back up
now button, and then click Later.
When you back up your data to Acronis Cloud, the first backup may take a considerable amount of time to
complete. Further backup processes will likely be much faster, because only changes to files will be transferred
over the Internet.
What is Blockchain?
Blockchain is a database that contains information about transactions and their sequence. In general,
a transaction represents an event, such as a financial operation or an operation with different kinds
of assets. The transactions are united in blocks, which are written to the database one by one and
form a block chain. Every transaction and every block has its own unique identification number.
What is very important is that every block stores information about all previous blocks of the chain.
Once written to the database, the information about a transaction cannot be changed in any way or
by anyone, and the transaction sequence cannot be modified either. Any attempt to change any
piece of information in the database can be easily identified by any user of the database, because
there would be no information about the false transaction or false block in all subsequent blocks.
This technology guarantees that data stored in the database is valid, belongs to a specific person, and
has not been modified by anyone. See more information about Blockchain at
https://en.wikipedia.org/wiki/Blockchain_(database).
A hash code is a unique number of fixed size that is produced by a hash function. The code
mathematically defines an arbitrary set of data, for example, a backup file. Any change of the backup
file leads to a change of its hash code. Therefore, to check if the file was changed, you only need to
compare the hash codes generated in the initial and current states of the file. If the codes match, this
is a guarantee that the file has not been modified by anyone.
When Acronis Notary receives hash codes of your files, it calculates a new single hash code and sends
it to the Ethereum Blockchain-based database. See more information about Ethereum at
https://www.ethereum.org/.
Once the hash code is in the database, the files that were used to calculate this hash code are
notarized by Acronis Notary. You can easily verify the file authenticity at any time by using the
procedure described in Verifying file authenticity (p. 47). Every notarized file has a notarization
certificate, which is documentary proof that the file is protected with the Blockchain technology. A
certificate contains general information about the file and technical details that allow you to
manually verify the file authenticity. Refer to Manual verification of a file's authenticity (p. 48) for
details.
The ASign solution can be used for signing any electronic documents, including different kinds of
contracts, agreements, certificates, financial documents, and official letters.
Signing a file
To sign a file on Acronis Cloud:
1. Go to https://www.acronis.com/my/online-backup/webrestore/, and then log in to your Acronis
account.
2. On the Files tab, browse to the required file, then click the gear icon at the right-hand side. Select
Send for signature in the opened menu.
3. Type the email addresses of the people who you want to sign the file, and then send them
invitations.
After the file is signed by all signees, Acronis Notary notarizes the file and generates a signature
certificate.
For the full description of the feature, refer to the English-language Acronis ASign web help at
https://www.acronis.com/en-us/support/documentation/ATI2017ASign/.
You can close both Acronis True Image 2019 on your computer and the Acronis Mobile app. The
backup will continue in the background mode.
If you want data changes (for example, new photographs) to be backed up automatically, make sure
the Continuous backup setting is turned on. If this setting is turned off, the new data is backed up
only when you tap Back up.
The connection between your computer and mobile device may be lost because of an error. To
restore it, select the mobile backup in the backup list of Acronis True Image, click Reconnect, and
then scan the QR code with your mobile device. After that, the backup will continue normally with
the same settings.
Acronis Mobile allows you to back up your data to Acronis Cloud, to local storage on your computer,
or to an NAS device, and then recover it in case of loss or corruption. Note that backup to the cloud
storage requires an Acronis account and Acronis Cloud subscription.
For more information about Acronis Mobile key features and supported devices, refer to Acronis
Mobile documentation.
Note that options of each backup type (disk-level backup, file-level backup, online backup, nonstop
backup) are fully independent and you should configure them separately.
If you want to reset all the modified options to the values that were set after the product installation
initially, click the Reset to initial settings button. Note that this will reset the settings for the current
backup only. To reset the settings for all further backups, click Reset to initial settings, select the
Save the settings as default check box, and then click OK.
4.6.1 Scheduling
Location: Options > Schedule
You can choose and set up one of the following backup or validation frequencies:
Nonstop (p. 36)—The backup will run every five minutes.
Daily (p. 55)—The operation will be executed once a day or more frequently.
Weekly (p. 55)—The operation will be executed once a week or several times a week on the
selected days.
Monthly (p. 55)—The operation will be executed once a month or several times a month on the
selected dates.
Upon event (p. 55)—The operation will be executed upon an event.
Do not schedule—The scheduler will be turned off for the current operation. In this case the
backup or validation will run only when you click Back up now or Validate respectively in the
main window.
Advanced settings
Clicking Advanced settings allows you to specify the following additional settings for backup and
validation:
To postpone a scheduled operation until the next time the computer is not in use (a screen saver
is displayed or computer is locked), select the Run the backup only when the computer is idle
check box. If you schedule validation, the check box will change to Run the validation only when
the computer is idle.
If you want to wake up the sleeping/hibernating computer to perform the scheduled operation,
select the Wake up the sleeping/hibernating computer check box.
When a backup takes a long time, it may be interrupted if the computer goes into sleep or
hibernation mode. To eliminate this situation, select the Prevent the computer from going to
sleep/hibernate check box.
Backup schemes along with the scheduler help you to set up your backup strategy. The schemes
allow you to optimize backup storage space usage, improve data storage reliability, and
automatically delete the obsolete backup versions.
For online backups, the backup scheme is preset and cannot be changed. After the initial full backup, only
incremental versions are created.
Acronis True Image 2019 allows you to choose from the following backup schemes:
Single version (p. 57) - select this scheme if you want to use the smallest backup storage.
Version chain (p. 58) - this may be the optimal scheme in many cases.
Incremental - select to create a full version after every five incremental versions. This is the
default scheme.
Differential - select to create only differential backups after an initial full backup.
Custom (p. 58) - select to set up a backup scheme manually.
You can easily change the backup scheme for a pre-existing backup. This will not affect the integrity
of the backup chains, so you will be able to recover your data from any previous backup version.
You cannot change the backup scheme when backing up to optical media such as a DVD/BD. In this case,
Acronis True Image 2019 by default uses a custom scheme with only full backups. This is because the program
cannot consolidate backups stored on optical media.
The program creates a full backup version and overwrites it every time according to the specified
schedule or when you run the backup manually. In this process, the old version is deleted only after a
new version is created.
At first the program creates the 1st full backup version. The version will be kept until you delete it
manually. After that, according to the specified schedule (or when you run backup manually) the
program creates: 1 full and 5 differential backup versions, then again 1 full and 5 differential backup
versions and so on. The versions will be stored for 6 months. After the period the program analyzes if
the oldest backup versions (except the 1st full version) may be deleted. It depends on the minimum
number of versions (eight) and version chains consistency. The program deletes the oldest versions
one by one after creating new versions with the same backup method (for example, the oldest
differential version will be deleted after creation of the newest differential version). First of all the
oldest differential versions will be deleted, then - the oldest full version.
Result: you have monthly backup versions for the last 6 months plus the initial full backup version
that may be kept for a longer period.
Required storage space: depends on the number of versions and their sizes.
According to the specified schedule (or when you run backup manually) the program creates: 1 full
and 6 incremental backup versions, then again 1 full and 6 incremental versions and so on. The
versions will be stored for 1 month. After the period the program analyzes if the oldest backup
versions may be deleted. It depends on the version chain consistency. To keep the consistency, the
program deletes the oldest versions by chains "1 full + 6 incremental backup versions" after creating
a new analogous version chain.
Result: you have backup versions for every day of the last month.
Required storage space: depends on the number of versions and their sizes.
In addition, you can create custom schemes from scratch based on full, differential or incremental
backup versions.
So first of all select one of the backup methods in the appropriate box.
Full (p. 31)
Select this method if you want to create only full backup versions.
To delete obsolete backup versions automatically, you can set one of the following cleanup rules:
Delete versions older than [defined period] (available for full method only) - Select this option to
limit the age of backup versions. All versions that are older than the specified period will be
automatically deleted.
Delete version chains older than [defined period] (available for incremental and differential
methods only) - Select this option to limit the age of backup version chains. The oldest version
chain will be deleted only when the most recent backup version of this chain is older than the
specified period.
Store no more than [n] recent versions (available for full method only) - Select this option to
limit the maximum number of backup versions. When the number of versions exceeds the
specified value, the oldest backup version will be automatically deleted.
Store no more than [n] recent version chains (available for incremental and differential methods
only) - Select this option to limit the maximum number of backup version chains. When the
number of version chains exceeds the specified value, the oldest backup version chain will be
automatically deleted.
Keep size of the backup no more than [defined size] - Select this option to limit maximum size of
the backup. After creating a new backup version, the program checks whether the total backup
size exceeds the specified value. If it's true, the oldest backup version will be deleted.
The first backup version option
Often the first version of any backup is one of the most valuable versions. This is true because it
stores the initial data state (for example, your system partition with recently installed Windows) or
some other stable data state (for example, data after a successful virus check).
Do not delete the first version of the backup - Select this check box to keep the initial data state. The
program will create two initial full backup versions. The first version will be excluded from the
automatic cleanup, and will be stored until you delete it manually.
If you select incremental or differential method, the first backup chain will start from the second full
backup version. And only the third version of the backup will be incremental or differential one.
You can also use a custom backup scheme without saving it. In this case, it will be available only for
the backup where it was created and you will be unable to use it for other backups.
If you do not need a custom backup scheme anymore, you can delete it. To delete the scheme, select
it in the backup schemes list, click Delete, and then click Delete scheme in the confirmation window.
The pre-defined backup schemes cannot be deleted.
9. Check that all settings are correct and click Back up now. If you want your first backup to be run
only at the time you specified in the Scheduler, click the down arrow to the right of the Back up
now button and select Later in the drop-down list.
If the free space becomes less than the specified value while the backup is being run, the program
will display the same message and you will have to make the same decisions.
Email notification
You can specify an email account that will be used to send you email notifications.
If you want to exclude unnecessary files from a backup, specify the appropriate file types on the
Exclusions tab of the backup options. You can specify exclusions for disk backups, file backups or
online backups.
When you select a specific file for backup, it cannot be excluded by the exclusion settings. The
settings are applicable only to files located on a partition, disk, or inside a folder selected for backup.
You can use these parameters to create an exact copy of your whole partitions or hard disks, and not
only the sectors that contain data. For example, this can be useful when you want to back up a
partition or disk containing an operating system that is not supported by Acronis True Image. Please
note that this mode increases processing time and usually results in a larger image file.
To create a sector-by-sector image, select the Back up sector-by-sector check box.
To include all unallocated disk space into the backup, select the Back up unallocated space check
box.
This check box is available only when the Back up sector-by-sector check box is selected.
A backup file can be password-protected. By default, there is no password protection for backups.
You cannot set or change the backup protection option for a pre-existing backup.
To protect a backup:
1. Enter the password for the backup into the corresponding field. We recommend that you use a
password longer than seven symbols and containing both letters (in upper and lower cases
preferably) and numbers to make it more difficult to guess.
A password cannot be retrieved. Please memorize the password that you specify for a backup protection.
2. To confirm the previously entered password, retype it into the corresponding field.
You can specify commands (or even batch files) that will be automatically executed before and after
the backup procedure.
For example, you may want to start/stop certain Windows processes, or check your data before
starting backup.
The Abort the operation if the user command fails (enabled by default) parameter will abort the
operation if any errors occur in command execution.
You can test a command you entered by clicking the Test command button.
Large backups can be split into several files that together make up the original backup. A backup can
also be split for burning to removable media.
The default setting - Automatic. With this setting, Acronis True Image 2019 will act as follows.
Backup reserve copy is an independent full backup version created immediately after a normal
backup. Even when you create an incremental or differential backup version containing only data
changes, the reserve copy will contain all the data selected for the normal backup. You can save
reserve copies of your backups on the file system, a network drive, or a USB flash drive.
Please, be aware that CD/DVDs are not supported as locations for reserve copies.
When backing up to removable media, you can make this media bootable by writing additional
components to it. Thus, you will not need a separate bootable disk.
Acronis True Image 2019 does not support creating bootable media if a flash drive is formatted in NTFS or
exFAT. The drive must have a FAT16 or FAT32 file system.
+ -
BIOS-based 32-bit computers
+ +
BIOS-based 64-bit computers
+ -
EFI-based 32-bit computers
- +
EFI-based 64-bit computers
When the program encountered an error while performing backup, it stops the backup process and
displays a message, waiting for a response on how to handle the error. If you set an error handling
policy, the program will not stop the backup process, but will simply handle the error according to
the set rules and continue working.
You can configure the cleanup settings for Acronis Cloud to optimize usage of its space.
To protect your data on Acronis Cloud from unauthorized access, you can use encryption. In this case,
when you back up your data, it will be encrypted by using the AES-256 algorithm and then saved to
Acronis Cloud. To encrypt and decrypt your data, the program needs the password, that you should
Warning! A password of an online backup cannot be retrieved. Please memorize the password
that you specify for backup protection.
While attempting to access the encrypted data, the program asks you to enter the password.
Note that you cannot set or change the password for a pre-existing online backup.
Compression level
You can choose the compression level for a backup:
None - the data will be copied without any compression, which may significantly increase the
backup file size.
Normal - the recommended data compression level (set by default).
High - higher backup file compression level, takes more time to create a backup.
Maximum - maximum backup compression, but takes a long time to create a backup.
The optimal data compression level depends on the type of files stored in the backup. For example, even
maximum compression will not significantly reduce the backup size, if the backup contains essentially
compressed files, like .jpg, .pdf or .mp3.
You cannot set or change the compression level for a pre-existing backup.
Operation priority
Changing the priority of a backup or recovery process can make it run faster or slower (depending on
whether you raise or lower the priority), but it can also adversely affect the performance of other
running programs. The priority of any process running in a system, determines the amount of CPU
usage and system resources allocated to that process. Decreasing the operation priority will free
more resources for other CPU tasks. Increasing backup or recovery priority may speed up the process
by taking resources from the other currently running processes. The effect will depend on total CPU
usage and other factors.
During a disk or partition backup process, which often takes a long time, some of the backed-up files
may be in use, locked, or being modified in one way or another. For example, you may work on a
document and save it from time to time. If Acronis True Image 2019 backed up files one by one, your
open file would likely be changed since the backup start, and then saved in the backup to a different
point in time. Therefore, the data in the backup would be inconsistent. To eliminate it, Acronis True
Image 2019 creates a so-called snapshot that fixes the data to back up to a particular point in time.
This is done before the backup starts and guarantees that the data is in consistent state.
When you create a backup to Acronis Cloud, your data is uploaded to one of the Acronis data centers
located in different countries. Initially, the data center is defined as the one closest to your location
when you create your Acronis account. Afterwards, your online backups and synced files are stored
in the same data center, by default.
When you work on your laptop and there is no power supply around you or when your computer has
switched to UPS after a blackout, it's reasonable to save the battery charge. Long-term backups may
consume the battery power quite fast, for example when you back up significant amount of data to
the cloud.
This setting does not block backup functionality completely. You can always start a backup manually.
Local mobile backups do not depend on this setting. Your mobile data is backed up to local storage
on your computer as usual.
When you create the first version of a backup, the Backup tab displays a graphical representation of
the backup content by file types.
Point to a color segment to see the number of files and the total size for each data category:
Pictures
Video files
Audio files
Documents
System files
Other file types, including hidden system files
Information on the data size:
Data to recover—size of the original data that you selected to back up.
Command Description
Date created This command sorts all backups from newest to oldest.
Sort by Date updated This command sorts all backups by date of the last
version. The newer the last backup version, the higher
the backup will be placed in the list.
Source type This command sorts all backups by the source type. The
order is as follows: entire PC backups - disk backups - file
backups - nonstop backup.
Destination type This command sorts all backups by the destination type.
The order is as follows: internal disk drives - external disk
drives - NAS devices - network shares - Acronis Cloud.
For example, backup validation is important before you recover your system. If you start recovery
from a corrupted backup, the process will fail and your computer may become unbootable. We
recommend that you validate system partition backups under bootable media. Other backups may
be validated in Windows. See also Preparing for recovery (p. 84) and Basic concepts (p. 28).
If you have backups that are not shown in the list, you can add them manually.
When you want to delete backups and backup versions you no longer need, please do it by using the
tools provided by Acronis True Image 2019.
Acronis True Image 2019 stores information on the backups in a metadata information database.
Therefore, deleting unneeded backup files in File Explorer will not delete information about these
backups from the database. This will result in errors when the program tries to perform operations
on the backups that no longer exist.
Depending on the backup type, this command completely deletes the backup from its location, or
allows you to choose whether you want to delete the backup completely or delete the backup box
only. When you delete a backup box only, the backup files remain in the location and you will be able
to add the backup to the list later. Note that if you delete a backup completely, the deletion cannot
be undone.
When you want to delete backup versions you no longer need, please use the instrument provided in
the application. If you delete backup version files outside Acronis True Image 2019, for example in
File Explorer, this will result in errors during operations with the backups.
For information about other ways to delete backups and backup versions, refer to Cleaning up
backups and backup versions (p. 79).
3. By default, Acronis True Image 2019 selects to delete all backup versions except the last one. If
the last version is an incremental or differential one, then the last backup chain will not be
selected.
If you want to delete:
All versions except the last one, then click Delete.
Specific versions, then clear the check boxes next to the versions that you want to keep, and
then click Delete.
Please wait for the cleanup operation to complete. If it is interrupted for some reason, some files
may stay in the storage. If this is the case, you can delete the files manually in File Explorer.
When you select a backup version to delete, please remember that this version may have dependent
versions. In this case the dependent versions will be selected for deletion as well, because data
recovery from such versions becomes impossible.
When you select a full version - the program also selects all dependent incremental and
differential versions till the next full version. In other words, the entire backup version chain will
be deleted.
When you select a differential version - the program also selects all dependent incremental
versions within the backup version chain.
Click the down arrow icon next to the backup to delete, and then click Delete. The backup and all its
versions, settings, and schedule will be deleted.
Cleanup settings
Acronis True Image provides online backup options for automatic cleanup of Acronis Cloud. For every
backup task, you can specify deletion of backup versions that have been kept longer than the
specified number of months or days. In addition, you can set the maximum number of backup
versions to be kept in Acronis Cloud. You can accept the default settings for those options or set the
values you need. For more information, see Acronis Cloud cleanup (p. 71).
You can also set up automatic cleanup of backup versions in the Acronis Cloud web application. For
this:
1. Go to https://www.acronis.com/my/online-backup/webrestore/, and then log in to your Acronis
account.
2. On the Files tab, move the mouse cursor over the appropriate backup.
3. Click the gear icon and select Clean up from the drop-down menu.
4. In the opened window, configure the cleanup settings, and then click Clean up now.
Note that the Acronis Cloud web application allows you to configure the cleanup rules for archives
and syncs, also.
One-time cleanup
When your Acronis Cloud is full or is running out of space, we recommend that you use the cleanup
tool in the Acronis Cloud web application. This tool allows you to free up a considerable amount of
space in the cloud, fast and easy.
Assign unique names (labels) to all partitions on your hard drives. This will make finding the disk
containing your backups easier.
When you use the Acronis bootable media, it creates disk drive letters that might differ from the
way Windows identifies drives. For example, the D: disk identified in the standalone Acronis True
Image (p. 192) might correspond to the E: disk in Windows.
6. Select Recover whole disks and partitions at the Recovery method step.
8. At the "Settings of partition C" (or the letter of the system partition, if it is different) step check
the default settings and click Next if they are correct. Otherwise, change the settings as required
before clicking Next. Changing the settings will be needed when recovering to the new hard disk
of a different capacity.
10. When the operation finishes, exit the standalone version of Acronis True Image 2019 (p. 192),
remove the rescue media and boot from the recovered system partition. After making sure that
you have recovered Windows to the state you need, restore the original boot order.
7. If you have a hidden partition (for example, the System Reserved partition or a partition created
by the PC manufacturer), click Details on the wizard's toolbar. Please remember the location and
size of the hidden partition, because these parameters need to be the same on your new disk.
8. Select Recover whole disks and partitions at the Recovery method step.
9. On the What to recover step, select the boxes of the partitions to be recovered.
If you select an entire disk, MBR and Track 0 of the disk will also be recovered.
Selecting partitions leads to appearance of the relevant steps "Settings of partition ...". Note that
these steps start with partitions which do not have an assigned disk letter (as usually is the case
Type. Check the partition type and change it, if necessary. Ensure that the System Reserved
partition (if any) is primary and marked as active.
11. On the Settings of Partition C step, specify the settings for the second partition, which in this
case is your system partition.
Click New location, and then select unallocated space on the destination disk that will
receive the partition.
Change the partition type, if necessary. The system partition must be primary.
12. Carefully read the summary of operations to be performed and then click Proceed.
When the recovery is complete
Before you boot the computer, please disconnect the old drive (if any). If Windows "sees" both the
new and old drive during the boot, this will result in problems booting Windows. If you upgrade the
old drive to a larger capacity new one, disconnect the old drive before the first boot.
Remove the rescue media and boot the computer to Windows. It may report that new hardware
(hard drive) is found and Windows needs to reboot. After making sure that the system operates
normally, restore the original boot order.
5. Select the Disks tab to recover disks or Partitions tab to recover specific partitions. Choose
objects you need to recover.
6. In the recovery destination field below the partition name, select the destination partition.
Unsuitable partitions are marked by a red border. Note that all data on the destination partition
will be lost because it is replaced by the recovered data and file system.
To recover to the original partition, at least 5 % of the partition space must be free. Otherwise, the Recover
now button will be unavailable.
7. [optional step] To set up additional parameters for the disk recovery process, click Recovery
options.
8. After you finish with your selections, click Recover now to start recovery.
The operation will not affect neither After operation completion, the
My source disk is MBR partition layout nor bootability of partition style will be converted to
and my OS does not the disk: partition style will remain GPT style, but the operating system
support UEFI MBR, the destination disk will be will fail booting from UEFI, since your
bootable in BIOS. operating system does not support it.
The operation will not affect neither The destination partition will be
partition layout nor bootability of converted to GPT style that will make
My source disk is MBR
and my OS supports UEFI the disk: partition style will remain the destination disk bootable in UEFI.
MBR, the destination disk will be See Example of recovery to UEFI
bootable in BIOS. system (p. 95).
After the recovery, please ensure that you boot your computer in UEFI mode. You may need to
change the boot mode of your system disk in the user interface of the UEFI boot manager.
6. Exit BIOS or UEFI BIOS and save the changes that you made. The computer will boot from Acronis
bootable media.
If the computer fails to boot from the first device, it tries to boot from the second device in the list, and so on.
6. Select a destination on your computer to where you want to recover selected files/folders. You
can recover data to its original location or choose a new one, if necessary. To choose a new
location, click the Browse button.
When you choose a new location, the selected items will be recovered by default without
recovering the original, absolute path. You may also wish to recover the items with their entire
folder hierarchy. In this case select the Keep the original folder structure check box.
7. When needed, set the options for the recovery process (recovery process priority, file-level
security settings, etc.). To set the options, click Recovery options. The options you set here will
be applied only to the current recovery operation.
8. To start the recovery process, click the Recover now button.
You can stop the recovery by clicking Cancel. Please keep in mind that the aborted recovery may
still cause changes in the destination folder.
Recovering files in File Explorer
To recover files and folders directly from File Explorer:
1. Double-click the corresponding .tib file, and then browse to the file or folder that you want to
recover.
2. Copy the file or folder to a hard disk.
Note: The copied files lose the "Compressed" and "Encrypted" attribute. If you need to keep these attributes, it
is recommended to recover the backup.
3. By default, Acronis True Image 2019 searches the folder selected on the previous step. To include
the entire backup in the search, click the down arrow, and then click in entire backup.
To return to the previous step, delete the search text, and then click the cross icon.
4. After the search is complete, select the files that you want to recover, and then click Next.
Note: Pay attention to the Version column. The files and folders that belong to different backup versions
cannot be recovered at the same time.
5. After the Files tab on the Acronis Cloud website opens, select the required online backup in the
Backups area.
6. Select the files and folders you want to recover. Click the Download button to start recovery.
If you selected several files and folders, they will be placed into a zip archive.
By default the data will be downloaded to the Downloads folder. You may change the download
path.
When you recover a disk to the original location, Acronis True Image 2019 does not download the
entire disk space to your computer. It scans your disk searching for data changes and recovers only
those files that are different from files in the image. This technology significantly reduces the amount
of data you need to download in order to recover your disk.
When you recover a disk to a different location or to an unallocated space, the process is very similar
to a recovery from a local storage. The only difference is in the data writing method. Acronis True
Image downloads and writes data by separate blocks, and not continuously. This technology
increases recovery speed and reliability of the entire process.
In other cases please run recovery again manually and make sure the recovery is complete.
Regardless of an interruption reason, Acronis True Image 2019 does not start recovery from the very
beginning. It resumes the process and downloads only the data that was not recovered.
Before you start, we recommend that you complete the preparations described in Preparing for
recovery (p. 84). If you recover your system to a new disk, you do not need to format the new disk, as
this will be done in the process of recovery.
Before starting this procedure, please make sure that your computer is connected to the Internet by
an Ethernet cable or over Wi-Fi.
4. To add the online backup of the system disk or system partition to the list of available backups,
click Browse.
6. Select the backup you want to use for recovery, and click OK.
7. On the Archive selection step, select the online backup and click Next.
8. On the Recovery method step, select Recover whole disks and partitions.
10. On the "Settings of partition C" (or the letter of the system partition, if it is different) step,
change the settings, if necessary. For example, you need to change settings when recovering to
the new hard disk of a different capacity.
11. Carefully read the summary of operations at the Finish step. If you have not resized the partition,
the sizes in the Deleting partition and Recovering partition items must match. Click Proceed.
12. When recovery is complete, exit the standalone version of Acronis True Image 2019 (p. 192),
remove the rescue media. Boot from the recovered system partition. After you check that you
have recovered Windows to the state you need, restore the original boot order (p. 96).
Note, that disk recovery options and file recovery options are fully independent, and you should
configure them separately.
If you want to reset all the modified options to their initial values that were set after the product
installation, click the Reset to initial settings button.
With this option you can select the disk recovery mode for image backups.
Recover sector-by-sector - select this check box if you want to recover both used and unused
sectors of disks or partitions. This option will be effective only when you choose to recover a
sector-by-sector backup.
You can specify commands (or even batch files) that will be automatically executed before and after
the recovery procedure.
For example, you may want to start/stop certain Windows processes, or check your data for viruses
before recovery.
The Abort the operation if the user command fails (enabled by default) parameter will abort the
operation if any errors occur in command execution.
You can test the command you entered by clicking the Test command button.
If you want the computer to reboot automatically when it is required for recovery, select the Restart
the computer automatically if needed for the recovery check box. This may be used when a
partition locked by the operating system has to be recovered.
Choose what to do if the program finds a file in the target folder with the same name as in the
backup.
This option is available only while restoring data from file-level backups.
Select the Overwrite existing files check box if you want to overwrite the files on the hard disk with
the files from the backup. If the check box is cleared, the more recent files and folders will be kept on
the disk.
Operation priority
Changing the priority of a backup or recovery process can make it run faster or slower (depending on
whether you raise or lower the priority), but it can also adversely affect the performance of other
running programs. The priority of any process running in a system, determines the amount of CPU
usage and system resources allocated to that process. Decreasing the operation priority will free
more resources for other CPU tasks. Increasing backup or recovery priority may speed up the process
by taking resources from the other currently running processes. The effect will depend on total CPU
usage and other factors.
Sometimes a backup or recovery procedure can last an hour or longer. Acronis True Image 2019 can
notify you when it is finished via e-mail. The program can also duplicate messages issued during the
operation or send you the full operation log after operation completion.
If the free space becomes less than the specified value while the backup is being run, the program
will display the same message and you will have to make the same decisions.
E-mail notification
You can specify an email account that will be used to send you email notifications.
Feature purpose Data protection from operating system Cleanup of local storage device and
corruption, hardware failures, and loss moving data to Acronis Cloud.
of separate files.
Data protection Overall protection of all data on a Protection of rarely used and old files,
computer, especially an operating mostly your personal documents,
system. photographs, and so on.
We recommend that you set the data center for an archive manually, when you are in a different
country and your default data center is not the closest to your current location. This will significantly
increase the data upload rate.
Note: You cannot change the data center after starting the archiving process.
To encrypt an archive:
1. When configuring the first archiving process, click Options.
2. Select the Encrypt archive by using the AES-256 algorithm check box.
3. Enter the password for the archive into the corresponding field. We recommend that you use a
password longer than seven symbols and containing both letters (in upper and lower cases
preferably) and numbers to make it more difficult to guess.
A password cannot be retrieved. Please memorize the password that you specify for an archive protection.
Acronis True Image asks for the password every time you try to modify the archive. To access the
archive, you must specify the correct password.
To track and control the protection status of your family's devices, use the web-based Online
Dashboard, which is accessible from any computer connected to the Internet. With this web
application, your family IT administrator can:
Control the current statuses of all backups and synchronizations on all family devices running
Windows, Mac OS X, iOS, and Android.
Add a new device to the list.
Manually start any backup on any computer.
Create new backups of any type (entire machine, file-level, disk-level) on PCs and Macs.
Change settings of existing backups.
Recover data from any backup located in Acronis Cloud, including backups from PCs, Macs, and
devices running iOS and Android.
Resolve some product-related issues.
What is ransomware?
Ransomware is malicious software that blocks access to some of your files or your entire system, and
then demands a ransom for unblocking. The software shows you a window informing you that your
files are locked and that you have to pay urgently, otherwise you will not be able to access the files
anymore. The message may also be disguised as an official statement from authorities, for example,
the police. The purpose of the message is to frighten a user and make them pay without asking for
help from an IT specialist or the authorities. Moreover, there is no guarantee that you will regain
control over your data after paying the ransom.
Your computer can be attacked by ransomware when you visit unsafe websites, open email
messages from unknown people, or when you click suspicious links in social networks or instant
messages.
Your computer can be attacked by cryptomining malware when you visit unsafe websites, open email
messages from unknown people, or when you click suspicious links in social networks or instant
messages.
Acronis Active Protection uses behavioral heuristics and analyzes chains of actions done by a
program, which is then compared with the chain of events in a database of malicious behavior
patterns. Since this method is not precise, it admits so-called false positives, when a trusted program
is detected as malware. To eliminate such situations, Acronis Active Protection asks you if you trust
the detected process, so you can add it to the permission list and set the default action for this
process by marking it as trusted or blocked. If you do not trust the process, you will be able to
blacklist it. In this case, that process will be blocked every time it tries to resume the malicious
activity.
To collect as many as possible different patterns, Acronis Active Protection uses Machine Learning.
This technology is based on mathematical processing of big data received through telemetry. It is a
self-learning approach, because the more data is processed, the more precisely a process may be
detected as ransomware or not.
In addition to your files, Acronis Active Protection protects the Acronis True Image application files,
your backups, archives, and Master Boot Record of your hard drive.
In case of ransomware, you can view the list of files that the process is going to modify, before you
make your decision.
After blocking the process, we recommend that you check if your files have been encrypted or
corrupted in any way. If this is the case, click Recover modified files. Acronis True Image 2019 will
search the latest file versions and recover the files from one of the following:
Temporary file copies that were preliminarily created during the process verification
Local backups
Cloud backups
To make this action the default, select the Automatically recover files after blocking a process check
box.
You can configure Acronis Active Protection settings and control the protection process from several
places:
Acronis Active Protection dashboard
Acronis Active Protection settings page
Windows taskbar notification area
Acronis Active Protection dashboard
The dashboard represents a number of statistical data on the protection process and allows you to
configure the main Acronis Active Protection settings, such as the permission lists and exclusions.
Initially, there is no quarantine folder on your computer. Acronis True Image 2019 creates it when
you sequentially perform the following steps:
1. Select the Ask to move potential threats to quarantine (experimental) check box in the Active
Protection settings. Refer to Managing Acronis Active Protection (p. 121) for details.
2. When Acronis True Image 2019 detects a suspicious process (p. 192) and informs you about it,
you decide whether to place the corresponding application in quarantine. Refer to Protecting
your computer from malware (p. 120) for details.
A quarantine is created in the root folder of the partition where the attacked files were stored, for
example C:\Acronis Active Protection Storage\Quarantine\. When you place a file in the quarantine,
You can also access the Cloud using a web browser, without having to install our application.
When you create a sync between two or more computers directly, an Acronis Cloud subscription
is not required.
Storage types
A synchronization process may be established between:
Two or more folders on two or more computers.
One or more computers and Acronis Cloud.
Acronis Cloud always contains the last versions of the synced files. At the same time you cannot
select a folder on Acronis Cloud to participate in a sync, such folder is created automatically.
Within one sync process you may assign only one sync folder on every computer.
You cannot select for synchronization a single file. To synchronize the file, select for synchronization the folder
that contains that file.
Data types
You can synchronize the following data:
Other folders inside the sync folder (that is, sync subfolders) and their content
You cannot synchronize the following data:
Disks and partitions
System files and folders
Hidden files and folders
Temporary files and folders
System registry
Databases
Data of e-mail programs (including Microsoft Outlook and others)
Other data that cannot be represented as separate files or folders (for example, contacts from
your address book)
Windows libraries (Documents, Music, etc.)
Icon Description
File Explorer
Sync state icons for files and folders:
Icon Description
Icon Description
All versions are stored on the Acronis Cloud which is accessible via the Internet. To use the Acronis
Cloud, you must have a subscription to the Acronis Cloud service. See details in Subscription
information.
To delete obsolete versions, run the cleanup operation in the Acronis Cloud web application. See
details in How to clean up your space on Acronis Cloud (p. 128).
If you use a trial version of Acronis True Image 2019, all stored versions, including the latest one, are deleted
from the Cloud when the trial period expires.
One condition - the deleted file must not be removed during Cloud clean-up.
6. Click the Recover button to recover the deleted file to its folder.
In this section
Disk cloning utility ........................................................................................................... 131
Migrating your system from an HDD to an SSD .............................................................. 136
If you use an UEFI computer and you decided to start the cloning procedure under bootable media,
please pay attention to the boot mode of the bootable media in UEFI BIOS. It is recommended that
the boot mode matches the type of the system in the backup. If the backup contains a BIOS system,
then boot the bootable media in BIOS mode; if the system is UEFI, then ensure that UEFI mode is set.
To clone a disk:
1. Start Acronis True Image 2019.
2. On the sidebar, click Tools, and then click Clone disk.
4. On the Source Disk step, select the disk that you want to clone.
Acronis True Image 2019 does not support cloning of dynamic disks.
5. On the Destination Disk step, select the destination disk for the cloned data.
If the selected destination disk contains partitions, you will need to confirm deletion of the
partitions. Note that the real data destruction will be performed only when you click Proceed on
the last step of the wizard.
If any disk is unpartitioned, the program will automatically recognize it as the destination and bypass this
step.
6. [This step is only available in the manual cloning mode]. On the Move method step, choose a
data move method.
As is—a new partition will be created for every old one with the same size and type, file
system and label. The unused space will become unallocated.
Proportional—the new disk space will be proportionally distributed between cloned
partitions.
Manual—you will specify a new size and other parameters yourself.
7. [This step is only available in the manual cloning mode]. On the Change disk layout step, you can
edit settings of the partitions that will be created on the destination disk. Refer to Manual
partitioning (p. 134) for details.
8. [Optional step] On the What to exclude step, you can specify files and folders that you do not
want to clone. Refer to Excluding items from cloning (p. 135) for details.
If the cloning operation is stopped for some reason, you will have to configure and start the
procedure again. You will not lose your data, because Acronis True Image does not alter the original
disk and data stored on it during cloning.
By default, Acronis True Image 2019 shuts down the computer after the clone process finishes. This
enables you to change the position of master/subordinate jumpers and remove one of the hard
drives.
To edit a partition:
1. Select the partition, and then click Edit. This will open the Partition Settings window.
SSD size
As SSDs usually have less capacity than HDDs, the occupied space on your old hard disk may exceed
the size of your SSD. If this is the case, migration is not possible.
However, we recommend to use the backup and recovery method in most cases. This method
provides more flexibility and control over migration. See Migrating to an SSD using the backup and
recovery method (p. 137).
If the BIOS of your computer does not show the SSD, verify that the power and data cables are
properly connected. You may also try to update the BIOS and SATA drivers. If these suggestions do
not help, contact the Support of your SSD manufacturer.
If the BIOS of your computer does show the SSD, you can try the following procedure:
Depending on your operating system, type cmd in the Search field or in the Run field, and then press
Enter.
diskpart
list disk The screen will show the disks connected to your computer. Find out the disk number for
your SSD. Use its size as the reference.
clean This operation removes all information from the SSD and overwrites the MBR with the default
one.
exit
exit
Start Acronis True Image 2019 and check whether it detects the SSD. If it detects the SSD, use the
Add new disk tool to create a single partition on the disk occupying the entire disk space. When
creating a partition, check that the free space before partition is 1 MB. For more information, see
Adding a new hard disk (p. 160).
The next step is to check whether your Acronis bootable media recognizes the SSD.
1. Boot from the Acronis bootable media.
2. Select Tools & Utilities -> Add New Disk in the main menu and the Disk selection screen will
show the information about all hard disks in your system. Use this for checking whether the SSD
is detected in the recovery environment.
3. If the screen shows your SSD, just click Cancel.
If the bootable media does not recognize the SSD and the SSD controller mode is AHCI, you can try to
change the mode to IDE (or ATA in some BIOS brands) and see whether this solves the problem.
Attention! Do not start Windows after changing the mode; it may result in serious system problems. You must
return the mode to AHCI before starting Windows.
If after changing the mode the bootable media detects the SSD, you may use the following procedure
for recovery or cloning under bootable media:
1. Shut down the computer.
2. Boot to BIOS, change the mode from AHCI to IDE (or ATA in some BIOS brands).
3. Boot from Acronis bootable media.
4. Recover or clone the disk.
5. Boot to BIOS and change IDE back to AHCI.
6. Start Windows.
What to do if the above suggestions do not help
You can try to create a WinPE-based rescue media. This may provide the necessary drivers. For more
information, see Creating WinPE-based rescue media.
Protection tools
Acronis Universal Restore media (p. 178)
If you recover your image on a computer with a dissimilar hardware configuration, the program
may not be able to find some of device drivers in the default folders, especially when the target
hardware has a specific mass storage controller.
This tool can be found in the Tools tab in Acronis True Image 2019 or downloaded from your
Acronis account. See details at: https://kb.acronis.com/ati2019/aur.
Acronis Startup Recovery Manager (p. 150)
Allows you to start Acronis True Image 2019 without loading the operating system by pressing
F11 at boot time before the operating system starts.
Rescue Media Builder (p. 140)
Allows you to create a bootable media with Acronis products (or their specified components)
installed on your computer.
Acronis Secure Zone (p. 156)
Allows you to store your backups in a special safe partition on your disk.
Try&Decide (p. 151)
Try any unsafe operation in the Try mode and then decide whether to apply or discard it.
Disk cloning
Clone disk (p. 131)
Use Clone disk wizard if you need to clone your hard disk drive by copying the partitions to
another hard disk.
Security and privacy
Acronis DriveCleanser (p. 164)
Acronis DriveCleanser utility provides for secure destruction of data on your hard disk.
System Clean-up (p. 168)
With the System Clean-up utility, you can clean up components (folders, files, registry sections,
etc.), related to general system tasks. These Windows components retain evidence of user PC
activity, so they too should be thoroughly wiped to maintain confidentiality.
Acronis Active Protection (p. 119)
Acronis Active Protection protects your computer from ransomware. When this service detects a
suspicious third-party process that tries to encrypt your files, you can block the process and
recover the affected files.
Disk management
Add new disk (p. 160)
Add new disk wizard helps you to add a new hard disk drive to your computer. You will be able to
prepare the new hard disk drive by creating and formatting new partitions on this hard disk.
Description
The following parameters can be used to load Linux kernel in a special mode:
acpi=off
Disables ACPI and may help with a particular hardware configuration.
noapic
Disables APIC (Advanced Programmable Interrupt Controller) and may help with a particular
hardware configuration.
nousb
Disables loading of USB modules.
nousb2
Disables USB 2.0 support. USB 1.1 devices still work with this option. This option allows using some
USB drives in USB 1.1 mode, if they do not work in USB 2.0 mode.
quiet
This parameter is enabled by default and the startup messages are not displayed. Deleting it will
result in the startup messages being displayed as the Linux kernel is loaded and the command shell
being offered prior to running the Acronis program.
nodma
Disables DMA for all IDE disk drives. Prevents kernel from freezing on some hardware.
nofw
Disables FireWire (IEEE1394) support.
nopcmcia
Disables PCMCIA hardware detection.
nomouse
Disables mouse support.
If you purchased a boxed version of the product that has a bootable CD and you did not update
Acronis True Image 2019, you can test this CD. Otherwise, please create a new bootable media. Refer
to Creating bootable media (p. 141) for details.
1. Configure your computer to enable booting from the bootable media. Then, make your bootable
media device (CD-ROM/DVD-ROM drive or USB drive) the first boot device. See Arranging boot
order in BIOS (p. 96).
2. If you have a rescue CD, press any key to start booting from the CD, when you see the prompt
"Press any key to boot from CD". If you do not press a key within five seconds, you will need to
restart the computer.
3. After the boot menu appears, choose Acronis True Image 2019.
If your wireless mouse does not work, try to replace it with a wired one. The same recommendation applies
to the keyboard.
If you do not have a spare mouse or keyboard, contact Acronis Support. They will build a custom rescue CD
that will have drivers for your models of the mouse and keyboard. Please be aware that finding the
appropriate drivers and making the custom rescue CD may take some time. Furthermore, this may be
impossible for some models.
4. When the program starts, we recommend you try recovering some files from your backup. A test
recovery allows you to make sure that your rescue CD can be used for recovery. In addition, you
will check that the program detects all the hard drives you have in your system.
If you have a spare hard drive, we strongly recommend that you try a test recovery of your system partition
to this hard drive.
2. Select a backup at the Archive location step and then click Next.
3. When recovering files with the rescue CD you are able to select only a new location for the files
to be recovered. Therefore just click Next at the Location selection step.
4. After the Destination window opens, check that all your drives are shown under My Computer.
If you store your backups on the network, you should also check that you can access the network.
If no computers are visible on the network, but the Computers Near Me icon is found under My Computer,
specify network settings manually. To do this, open the window available at Tools & Utilities Options
Network adapters.
5. Select the destination for the files and then click Next.
6. Select several files for recovery by selecting their check boxes and then click Next.
3. Select Acronis True Image 2019 in the boot menu to continue booting from the bootable media.
To see the available video modes, press the Enter key when the appropriate message appears.
4. Choose a video mode you think best suitable for your monitor and type its number in the
command line. For instance, typing 338 selects video mode 1600x1200x16 (see the below figure).
5. Wait until Acronis True Image 2019 starts and make sure that the quality of the Welcome screen
display on your monitor suits you.
To test another video mode, close Acronis True Image 2019 and repeat the above procedure.
To do this, start Acronis Media Builder, select the required media components, and type the mode
number with the "0x" prefix (0x338 in our instance) in the command line at the "Bootable media
startup parameters" step, then create the media as usual.
How to activate
To activate Acronis Startup Recovery Manager:
1. Start Acronis True Image 2019.
2. In the Tools section, click All tools, and then double-click Activate Acronis Startup Recovery
Manager.
3. In the opened window, click Activate.
How to use
If a failure occurs, turn on the computer and press F11 when you see the "Press F11 for Acronis
Startup Recovery Manager" message. This will start a standalone version of Acronis True Image 2019
that differs only slightly from the complete version.
How to deactivate
To deactivate Acronis Startup Recovery Manager:
1. Start Acronis True Image 2019.
2. In the Tools section, click All tools, and then double-click Activate Acronis Startup Recovery
Manager.
3. In the opened window, click Deactivate.
You won't be able to use the previously activated Acronis Startup Recovery Manager if the
Try&Decide is turned on. Rebooting the computer in the Try mode will allow you to use Acronis
Startup Recovery Manager again.
When Acronis Startup Recovery Manager is activated, it overwrites the master boot record (MBR)
with its own boot code. If you have any third-party boot managers installed, you will need to
reactivate them after the Startup Recovery Manager has been activated. For Linux loaders (e.g. LiLo
and GRUB), you might consider installing them to a Linux root (or boot) partition boot record instead
of MBR before activating Acronis Startup Recovery Manager.
UEFI boot mechanism is different from the BIOS one. Any OS loader or other boot program has its
own boot variable that defines a path to the corresponding loader. All loaders are stored on a special
partition called EFI System Partition. When you activate Acronis Startup Recovery Manager in
UEFI-booted system, it changes the boot sequence by writing its own boot variable. This variable is
added to the list of variables and does not change them. Since all loaders are independent and do
not affect each other, there is no need to change anything before or after activating Acronis Startup
Recovery Manager.
11.5 Try&Decide
When you turn Try&Decide on, your computer is in the Try mode. After that you can perform any
potentially dangerous operations without worrying that you might damage your operating system,
programs or data. When you turn Try&Decide off, you decide if you want to apply the changes to
your computer or you want to discard them.
When your computer reboots for whatever reason while working in the Try mode, before booting of
the operating system starts, you will be shown a dialog offering you two choices – stop the mode and
discard changes or continue working in the mode. This will allow you to discard the changes that
have resulted in a system crash. On the other hand, if you reboot, for example, after installing an
application, you can continue working in the Try mode after starting Windows.
Please note that while working in the Try mode you will experience slowing down of the system
performance. Furthermore, the process of applying changes may take a long time, especially if you
leave the Try mode turned on days on end.
Please be aware that Try&Decide cannot track changes in disk partitions, so you will be unable to use
the Try mode for virtual operations with partitions such as resizing partitions or changing their layout.
In addition, you must not use the Try&Decide and disk defragmentation or disk error checking
utilities at the same time, because this can irreparably corrupt the file system, as well as make the
system disk unbootable.
When the Try mode is started, you won't be able to use the previously activated Acronis Startup
Recovery Manager. Rebooting the computer in the Try mode will allow you to use Acronis Startup
Recovery Manager again.
Try&Decide and Nonstop Backup cannot work simultaneously. Starting the Try mode suspends
Nonstop Backup. Nonstop Backup will resume after you stop the Try mode.
When the Try mode is started, you won't be able to use the "Hibernate" power saving mode.
Try&Decide cannot work when a partition in your system is encrypted with BitLocker.
Try&Decide cannot protect Acronis Secure Zone or use it as a storage for the virtual changes.
6. To stop the Try mode, click the Try&Decide icon in the Try&Decide window.
Protected partitions
To change this setting:
Notifications
To change the default notification settings, click Change alert settings. The Settings window opens.
On free disk space remaining - If the amount of free space in the storage for virtual changes
becomes less than the specified value, the program displays a notification message.
On time elapsed since Try&Decide started - The program will notify you if Try&Decide has been
working for longer than the period of time that you specified.
Software evaluation
Sometimes it may be useful to turn on the Try mode before installing new software. For example, we
recommend that you turn it on when you want to:
Choose antivirus software.
There are known cases when installation of antivirus software cripples functionality of some
applications or they may even refuse to launch after antivirus installation. You can test a trial
version of the antivirus. If you encounter any problems, discard the changes in your system and
try antivirus software from another vendor.
Install a trial version of a program.
It is well known that the "Add or Remove Programs" component of the Windows Control Panel
cannot give a complete guarantee of cleanly uninstalling applications. If you do not like the
program that you installed, discard the changes in your system. In this case, you can be sure that
Try&Decide removed the program without a trace.
Install suspicious software.
If you do not trust the vendor of the software that you want to install, or when the source of the
software is unknown, turn on the Try mode before installing this software. If anything goes
wrong, discard the changes made in the Try mode.
File recovery
You have accidentally deleted some files and then emptied the Recycle Bin. Then you have
remembered that the deleted files contained important data and now you are going to try to
undelete them using the appropriate software. However, sometimes you may do something wrong
Turn on the Try mode and surf the Web as you please. Afterwards, if you want to remove all traces of
your activity, discard the changes made in the Try mode.
When you create an Acronis Secure Zone, it is displayed in the Other section of File Explorer. You can
navigate through the Acronis Secure Zone as an ordinary partition.
If Acronis Secure Zone is password-protected, any operation, except viewing version details, requires
entering the password.
You can use the Acronis Secure Zone as the storage for virtual system changes in the Try mode. The
Try&Decide data will be automatically cleaned up after you stop a Try&Decide session.
Acronis True Image does not delete nonstop backup versions in the Acronis Secure Zone
automatically. Such versions can only be deleted manually. For more information see Acronis
Nonstop Backup data storage (p. 38).
The minimum size is about 50 MB, depending on the geometry of the hard disk. The maximum size is
equal to the disk’s unallocated space plus the total free space on all partitions selected at the
previous step.
When creating/enlarging the Acronis Secure Zone, the program will first use the unallocated space. If
the unallocated space is not enough to achieve the desired size, the selected partitions will be
decreased in size. Resizing of partitions may require the computer to be rebooted.
When reducing the size of the Acronis Secure Zone, if there is any unallocated space on the hard disk,
it will be allocated to the selected partitions along with the space freed up from the Acronis Secure
Zone. Thus, no unallocated space will remain on the disk.
Warning! Reducing a system partition to the minimum size may prevent your operating system from
booting-up.
The program will ask for the password at any operation relating to the Acronis Secure Zone such as
data backup and recovery, mounting images or validating backups in the Acronis Secure Zone,
resizing and deleting the Acronis Secure Zone.
Acronis True Image 2019 repair or update will not affect the password. However, if the program is removed and
then installed again while keeping the Acronis Secure Zone on the disk, the password to the Acronis Secure Zone
will be reset.
Select the partitions to which you want to add the space freed up from Acronis Secure Zone. If you
select several partitions, the space will be distributed proportionally to each partition’s size.
Also, you can choose to remove the Acronis Secure Zone while uninstalling the program.
File System
You can either leave the partition unformatted, or choose between the following file system types:
NTFS is a native file system for Windows NT, Windows 2000, Windows XP, and later operating
systems. Choose it if you use these operating systems. Note, that Windows 95/98/Me and DOS
cannot access NTFS partitions.
FAT 32 is an improved 32-bit version of the FAT file system that supports volumes up to 2 TB.
FAT 16 is a DOS native file system. Most operating systems recognize it. However, if your disk
drive is more than 4 GB, it is not possible to format it in FAT16.
Ext2 is a Linux native file system. It is fast enough, but it is not a journaling file system.
Ext3 – officially introduced with Red hat Linux version 7.2, Ext3 is a Linux journaling file system. It
is forwards and backwards compatible with Linux Ext2. It has multiple journaling modes, as well
as broad, cross platform compatibility in both 32-bit and 64-bit architectures.
Partition label
Partition label is a name, assigned to a partition so that you can easily recognize it. For example, a
partition with an operating system could be called System, a data partition — Data, etc. Partition
label is an optional attribute.
Partition type (these settings are available only for MBR disks)
You can define the new partition as primary or logical.
Primary - choose this parameter if you are planning to boot from this partition. Otherwise, it is
better to create a new partition as a logical drive. You can have only four primary partitions per
drive, or three primary partitions and one extended partition.
Note: If you have several primary partitions, only one will be active at a time, the other primary
partitions will be hidden and won’t be seen by the OS.
Mark the partition as active - select this check box if you are planning to install an operating
system on this partition.
Logical - choose this parameter if you don’t intend to install and start an operating system from
the partition. A logical drive is part of a physical disk drive that has been partitioned and
allocated as an independent unit, but functions as a separate drive.
Acronis DriveCleanser cannot wipe partitions on dynamic and GPT disks, so they will not be shown.
2. Choose an option:
Write pattern
Enter a hexadecimal value, for example, a value of this kind: 0x00, 0xAA, or 0xCD, etc. These
values are 1 byte long, but they may be up to 512 bytes long. Except for such values, you may
enter a random hexadecimal value of any length (up to 512 bytes).
If the binary value is represented by the 10001010 (0x8A) sequence, then the complementary binary
value will be represented by the 01110101 (0x75) sequence.
To start the System Clean-up wizard, click the Start button —> Acronis (product folder) —> True
Image —> Tools and Utilities —> System Clean-up.
After you start the wizard, it will search for any traces of user actions stored by Windows. When the
search is finished, its results will be available at the top of the wizard window.
You can view the search results and manually select the items you wish to remove.
If you want to change the default system clean-up settings, click the corresponding link in the first
window of the System Clean-up wizard.
General
By default, the summary dialog window is displayed after each clean-up procedure ends (the Show
summary check box is selected). If you do not need this window to be displayed, uncheck the box.
Clean-up options
System Clean-up utilizes a number of the most popular data destruction methods. Here, you can
select the common data destruction method which will be used by default for all other components.
The data destruction methods are described in detail in Hard Disk Wiping Methods (p. 174) of this
guide.
Files
The Files setting defines the names of files to clean with System Clean-up wizard and can be used
with a search string.
Under the Windows operating system, a search string can represent a full or partial filename. A
search string can contain any alphanumeric symbols, including commas and Windows wildcard
symbols, and can have values similar to the following:
*.* – to clean all files with any file names and extensions.
*.doc – to clean all files with a specific extension – Microsoft document files in this case .
read*.* – to clean all files with any extensions, and names beginning with "read".
read?.* – to clean all files having five-letter names and any extensions, names beginning with
"read"; the fifth letter is random.
The last search string, for example, will result in the removal of read1.txt, ready.doc files, but
readyness.txt will remain with its longer name (excluding the extension)
You can enter several different search strings separated by semicolons; for example:
All files with names corresponding to at least one of the search strings will be cleaned.
If you want to change the settings of this parameter, you can use the Remove button to delete from
the list the drives you don't need to clean free space on.
If you wish to add these drives to the list again, use the Add button.
Computers
The Computers setting is used for cleaning up the registry search strings you have used for finding
computers in the local network. These strings keep information on what has interested you in the
network. These items should also be deleted to maintain confidentiality.
The Computers setting is similar to the Files setting. It is a string that can contain any number of full
or partial computer names separated by semicolons. The deletion of computer search strings is
based on a comparison with the Computers setting value according to Windows rules.
If you simply need to delete all local network computer search strings (suitable in most cases), just
leave the default value of this setting. To restore the default settings:
Select the Find Computer List component
Make sure the Enable check box is selected
Select the Computers setting; make sure its text box is clear.
As a result, all computer search strings will be deleted from the registry.
After entering the Computers setting value, you can browse the search strings found by the System
Clean-up Wizard in the registry. To do so, click Show Computers. You will see the window with full
and partial computer names searched for in the network. These items will be deleted.
This template can contain any command names or their parts separated by semicolons, e.g.:
This will result in removing commands with names corresponding to or containing any of the names
or parts of names you entered.
Click Show network places to view the list of network places that you visited using the credentials
you want to delete.
11.8.2.4 Preview
When the scanning is finished, its results will be available in the upper part of the wizard window. By
default, all system components are scanned for clean-up. If you want to customize which of the
system components should be scanned and which should not, change the default clean-up settings.
You can view the search results and manually select/unselect the items you wish to clean up/keep. In
order to help you with making the right choice, all the components are provided with brief
descriptions. Just click on the component's name and its description will be displayed in the right side
of the window.
To select/unselect a component
Expand the System Components item in the System Clean-up tree and make sure that the
component you wish to clean up is selected. If you do not want to clean up a component, simply
clear its check box.
The progress bar indicates the level of completion of the selected operation.
In some cases, the operation may take a long time to be completed. If this is the case, select the
Shutdown the computer after completion check box. When the operation finishes, Acronis True
Image 2019 will turn the computer off.
Leakage mechanism
Data is stored on a hard disk as a binary sequence of 1 and 0 (ones and zeros), represented by
differently magnetized parts of a disk.
Generally speaking, a 1 written to a hard disk is read as 1 by its controller, and 0 is read as 0.
However, if you write 1 over 0, the result is conditionally 0.95 and vice versa – if 1 is written over 1
the result is 1.05. These differences are irrelevant for the controller. However, using special
equipment, one can easily read the «underlying» sequence of 1's and 0's.
Such transfer will make configuring backups on the new PC much easier. You only need to export the
settings and then import them to the other PC. The settings are exported in the form of script files.
The settings content can be different depending on a backup type. In case of "classic" disk and file
type backups the settings consist of the following items:
list of items for backup
backup options
backup location
schedule
backup scheme
automatic clean-up rules
backup version naming rules
The settings of nonstop backup are as follows:
list of items for nonstop protection
Nonstop Backup data storage location (a list of locations, if there are several)
You cannot import online backup settings from one computer to another.
If you want to copy some of your backups to another computer, it is recommended to export the
settings of those backups too. Thus you will not lose some of the copied backup's functionality.
8. [Optional] Specify Linux kernel parameters. Refer to Bootable media startup parameters (p. 143)
for details.
You can select 32-bit and/or 64-bit components. The 32-bit components can work on 64-bit
hardware. However, you need 64-bit components to boot a 64-bit computer that uses Unified
Extensible Firmware Interface (UEFI).
To use the media on different types of hardware, select both types of components. When
booting a machine from the resulting media, you will be able to select 32-bit or 64-bit
components on the boot menu.
If Acronis True Image 2019 is installed on your computer, you can place it on the media as well.
In this case, you will have a single bootable media containing both components required for
recovery to dissimilar hardware.
10. Select a destination for the media:
CD
DVD
USB flash drive
ISO image file
You will need to specify the .iso file name and the destination folder.
When the .iso file is created, you can burn it onto a CD or DVD. For example, in Windows 7
and later, you can do this using a built-in burning tool. In File Explorer, double-click the
created ISO image file, and then click Burn.
11. Specify the mass storage drivers to be used by Acronis Universal Boot.
You do not have to add the drivers now. You can do this later when you apply Acronis Universal
Boot to a computer.
12. Click Proceed.
When the media is created, unplug it from your computer. This is your Acronis Universal Boot
media.
When the process is complete, you will be able to configure the network connection and specify
drivers for the video adapter, USB and other devices.
A typical scenario:
1. You start Acronis True Image 2019 and provide credentials to your Acronis account.
2. The following error appears: "An error occurred while signing in. Please try again later."
How to resolve
Error "You've exceeded the maximum number of activations for this serial number"
A typical scenario:
1. You start Acronis True Image 2019 and see that the product is not activated.
2. The following error appears: "You've exceeded the maximum number of activations for this serial
number."
How to resolve
A typical scenario:
1. You want to activate Acronis True Image 2019 and provide a serial number.
2. The serial number is accepted, but you see one of the following error messages: "You've
exceeded the maximum number of activations for this serial number." or "The trial will expire in
29 days."
3. You try to resolve the issue by clicking Resolve issue or Enter serial number, but the following
error appears in a later step: "This serial number is already registered to another account."
How to resolve
Files and folders are not shown when browsing backups in File Explorer
A typical scenario:
1. You want to browse backup contents in File Explorer, either for recovery purposes or to check
what is inside a particular backup.
2. You locate the corresponding .tib file and double-click it.
A typical scenario:
1. You have a backup configured to be saved on a USB drive. You plug in the USB drive to your
computer, and then start the backup.
2. The backup does not start, pauses or fails. The following error appears: "Plug in external drive
<drive_letter>."
How to resolve
A backup to Acronis Cloud fails with error "Write error" or "Error occurred while writing the file" or
"FES request failed"
A typical scenario:
1. Backup to Acronis Cloud fails.
2. When you click the status icon to see details, the error says "Write error" or "Error occurred
while writing the file" or "FES request failed."
How to resolve
Blue Screen of Death (BSOD) after recovery to new hardware and error "Stop 0x0000007B" due to
missing drivers
A typical scenario:
1. You recover your computer to dissimilar hardware and apply Acronis Universal Restore.
2. The process completes successfully, but the recovered computer goes to BSOD and the following
error appears: "Stop 0x0000007B."
How to resolve
4. Click the arrow next to the Help icon ( ), and select Generate system report.
5. After the report is generated, click Save and in the opened window specify a location for the
created file.
The program will archive the report into a zip file.
This will open a confirmation window that lists the information to be sent via Internet to the Acronis
Knowledge Base. Click OK to permit sending the information.
If in future you would like to send such information without confirmation, select the Always send
without confirmation check box.
If Acronis True Image 2019 crashes, please provide the following information:
1. A description of the exact sequence of steps performed before you encountered the issue.
2. A crash dump. For information on how to collect such a dump, see the Acronis Support
Knowledge Base (KB) article at https://kb.acronis.com/content/27931.
If Acronis True Image 2019 causes a Windows crash:
1. A description of the exact sequence of steps performed before you encountered the issue.
2. A Windows dump file. For information on how to collect such a dump see the Acronis Support KB
article at https://kb.acronis.com/content/17639.
If Acronis True Image 2019 hangs:
1. A description of the exact sequence of steps performed before you encountered the issue.
2. A userdump of the process. See the Acronis Support KB article at
https://kb.acronis.com/content/6265.
3. The Procmon log. See the Acronis Support KB article at https://kb.acronis.com/content/2295.
If you cannot access the information, contact Acronis Customer Central for an FTP link for uploading
files.
To make a decision:
1. On the sidebar, click Settings.
2. To leave the program, clear the Participate in the Acronis Customer Experience Program check
box.
If you choose to participate, the technical information will be automatically collected every 90 days.
We will not collect any personal data, like your name, address, phone number, or keyboard input.
Participation in the CEP is voluntary, but the end results are intended to provide software
improvements and enhanced functionality to better meet the needs of our customers.
"Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone",
"Acronis True Image", "Acronis Try&Decide", and the Acronis logo are trademarks of Acronis
International GmbH.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the
United States and/or other jurisdictions.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit
permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
Third party code may be provided with the Software and/or Service. The license terms for such
third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used
with the Software and/or Service at https://kb.acronis.com/content/7696
A Limitations: