• No results found

Appendix. IriScene Remote Manager Version 4.8 FRACTALIA Software

N/A
N/A
Protected

Academic year: 2021

Share "Appendix. IriScene Remote Manager Version 4.8 FRACTALIA Software"

Copied!
28
0
0

Loading.... (view fulltext now)

Full text

(1)

Appendix

IriScene Remote Manager

Version 4.8

FRACTALIA Software

(2)

1. SYNCHRONIZER WITH ACTIVE DIRECTORY (AD) ... 3

1. SyncAD2IRM.exe.config ... 3

2. Installation ... 4

2. REPEATERS... 5

1. Normal ... 5

3. CONFIGURATION OF SQLREPORTING SERVICES... 8

B. CLIENT TOOLS ... 13

1. IRM CONFIGURATION FILES... 13

1. Config.xml ... 13

2. Updates.xml ... 15

3. PatchClientModule.config... 17

4. SelfServiceTool.exe.config... 17

5. Registering terminals by command line... 17

C. UTILITIES ... 19

1. INSTANT RECOVERY SYSTEM UNATTENDED INSTALACION... 19

1. Normal installation ... 19

2. Unattended Installation ... 19

3. Update ... 20

2. INSTANT RECOVERY SYSTEM COMMAND LINES... 20

(3)

converting them into IRM groups and positioning the machines in the same place as in the AD.

1. SyncAD2IRM.exe.config

The configuration file is used to introduce the synchronization characteristics.

<syncAD2IRM> <domains>

<domain server="ECCWEB48" adUser="administrator" adPass="P@ssw0rd"

nbDomain="" adRoot="DC=irm48,DC=ecc" syncPart="0" descriptionToAlias="true" /> </syncAD2IRM>

Server: introduces the domain server against which the replica will be made. You can specify

the complete domain name with which it will search for the closest domain server.

adUser: introduces the AD user name that is used to connect to it. If the machine belongs to

the AD then this field can be omitted, indicating the synchroniser to use the user that is functioning already.

adPass: introduces the user password with which you access the AD. If the user is omitted

then this field will not be valid.

nbDomain: introduces the domain name. This parameter is only necessary if the machine in

which the synchroniser is running does not have access to the DNS server associated with the active directory.

If you omit this parameter and specify the user you must specify in the form: user@domain

(for example administrator@fractalia.es)

adRoot: introduces the AD root partition that you want to synchronise. It must have the form

DC=fractalia, DC=biz.

Sync Part: introduces partial synchronisation instead of a total one. The synchroniser will

only take into account those elements that have been modified since the last synchronisation. If various domain servers are used, the synchroniser cannot detect changes made in a domain server other than the one indicated, so it is not recommendable to put a very high value for this parameter.

<sync2IRM

connectionString = "Data Source=ECCWEB48\SQL2005;Initial Catalog=IRM48;User ID=sa;pwd=P@ssw0rd;Application Name=SyncAD2IRM"

idClient = "3" timeSleep="0"

(4)

timePoll="1" timeRetry="1" numRetry="1" connectionType="1" />

Connection String: configures the connection string to the IRM database. Pressing on

“Check”, you can verify that the connection string to the IRM database is correct.

IdClient: when you are using multiple clients identify the IRM client to which the

synchronisation data is assigned.

Time Sleep: to configure the delay, in milliseconds, between the synchronisation of the AD

elements. This field is used to slow the service so as not to consume all the machine’s resources.

Default Rollback Mode: configures the Rollback mode as manual or automatic, with which

new machines detected in AD will be configured.

Time Poll: configures the time, in seconds, of the call to check the inventory with which the

new groups detected in AD will be configured.

Time Retry: configures the time, in seconds, of the call to check the updates with which the

new groups detected in AD will be configured.

numRetry: configures the time, in seconds, of the call to check the state of the Rollback with

which the new groups detected in AD will be configured. This call time is different from the one in the IRM platform group properties tab.

2. Installation

The synchronizer can be installed in any machine, even if it is not registered in the AD, although it is recommendable to install it in a domain server for security and performance. It is necessary to create a service using the executable of ADSync, and initiate it, so that it functions correctly. For this, execute from the command line:

sc create “Servicename” binPath= ”path where the SyncAD2IRM.exe is to be found” start= auto

Every time a change is made in the configuration file the service must be rebooted. Configuration example:

(5)

Figure 1. Example of synchroniser configuration

<syncAD2IRM> <domains>

<domain server="172.16.0.64" adUser="administrator" adPass="pass"

nbDomain="" adRoot="DC=tests,DC=fractalia" syncPart="0" descriptionToAlias="true" /> </syncAD2IRM>

<sync2IRM

connectionString = "Data Source=172.16.0.64;Initial Catalog=IRM48;User ID=sa;pwd=pwd;Application Name=SyncAD2IRM" idClient = "3" timeSleep="0" defaultRollBackMode="Manual" timePoll="1" timeRetry="1" numRetry="1" connectionType="1" />

2. Repeaters

1. Normal

You need to mount a server, outside the LAN, with the “IRM Repeater vX.X, Setup.exe”

application. This application acts as a “Bypass” for the user petitions to take remote control of other terminals, if this application is deactivated the connections die, and it will not be possible to establish remote connections in accordance with petitions.

On installing the application, the notification area will show that the Repeater is executing. you press on it with the right hand button of the mouse (Figure 2), you can access the Repeater adjustments (Figure 3).

(6)

To configure the Normal mode introduce the Viewer and Server port. The Viewer port must be mapped in the router input and with the terminal over which you want to take remote control.

Figure 3. Repeater Adjustments

For the client it is necessary to configure the Remoting fields so that it connects correctly. The configuration can be made with the local client configurator or by modifying the client configuration file.

If you do it through the local configurator, you have to execute the application (Figure 4),

(7)

Figure 4. Opening local client configurator

Figure 5. Local client configurator

Server: introduces the server name or IP where the Remoting module is installed. Directory: introduces the path to the Remoting module folder.

Port: introduces the port through will go to Remoting. Resource: introduces the Remoting resource name.

If you do it through the configuration file, you must edit the Config.xml file in the path

“%PROGRAMFILES%\4.8\Iriscene Remote Manager\" and reboot the IRM service.

(8)

<Enabled>true</Enabled>

Enables Remoting.

<ReconnectionTime>15</ReconnectionTime>

Reconnection time for Remoting.

<HttpSleepRetryConnectionTime>500</HttpSleepRetryConnectionTime> <UrlGenuineChannelLog>D:\IRM\log\</UrlGenuineChannelLog> <Url>

<Protocol>ghttp</Protocol> <Host>ECCWEB48</Host>

Public IP or DNS of the server where you find the Remoting module.

<Port>80</Port>

Remoting port

<Dir>Fractalia/IRM/IRMRemotingServiceHost</Dir>

Path to the IRMRemotingServiceHost folder in the Server

<Resource>IrmRemotingService.rem</Resource> </Url>

</remotingChannel>

Figure 6. Normal

3. Configuration of SQL Reporting Services

Report Server is a complete server solution to allow you to create, administrate and deliver Web reports.

(9)

Figure 7. Reporting Services Configuration

Execute the Reporting Services Configuration (Figure 7) and connect with the database server (Figure 8).

Figure 8. Connection with database server

Next, you have to create the Report Server virtual directory, to do this, click on Report Server

Virtual Directory, press the New button and select the WebSite where you want to create it.

(10)

Figure 9. Create a Report Server virtual directory

(11)

Figure 11. Create a Report Manager virtual directory

(12)

Lastly, you have to connect with the Report Server database, to do this, you have to introduce the credentials to connect you with the database, click on the Connect button and apply the changes by pressing the Apply button. (Figure 13 and Figure 14)

Figure 13. Connect to the Report Server database

(13)

<general>

<GuidTerminal>SOFTWARE\Fractalia\Irm\</GuidTerminal>

In this line, the part of the register where the terminal identifier is kept is configured.

<LogFile>D:\IRM\log\IriSceneRemoteManager.log</LogFile>

Configures the path where the log of calls between client and platform is stored.

<CentralPlatform>

http://www.fractaliasoftware.com/applications/IRM_WS.asmx </CentralPlatform>

Configures the address in the IRM server where the Web Service connection with the client can be found.

<Client>ECC</Client>

Shows the company where the client is registered.

<ServiceStartTime>30</ServiceStartTime>

Configures the delay, in seconds, which the IRM service takes before initiating after starting the machine.

<ReconnectionTime>1</ReconnectionTime>

Configures the time, in minutes, of reconnection with the Web Service, in case this is interrupted.

<RestartInterval>60</RestartInterval>

Configures the time, in seconds, that is displayed in the countdown window when the computer has to reboot for some action taken in the platform.

<User>Fractalia</User>

Configures the administrator’s user name.

<Password>82ZuX+E=</Password>

Shows the coded password of IRM.

<Language>es</Language>

Configures the default language for IRM tools in the client.

<EnableInstallLog>true</EnableInstallLog>

Enables the IRM logs in the client.

</general> <proxy>

<IpProxy> </IpProxy>

(14)

<PortProxy> </PortProxy>

Configures the Proxy port.

<UserProxy> </UserProxy>

Configures the user for Proxy authentication.

<PasswordProxy> </PasswordProxy>

Configures the password for Proxy authentication.

<DomainProxy> </DomainProxy>

Configures the Proxy domain.

</proxy> <inventory>

<InventoryPath>D:\IRM\Datos</InventoryPath>

Configures the address where the client inventory is going to be stored.

</inventory> <upload>

<UploadTime>1</UploadTime>

Configures the time frequency, in minutes, the data found in the send data path is sent.

<UploadPath>D:\IRM\Datos\Envio</UploadPath>

Configures the address to upload data. Any file placed in this folder will be sent in

UploadTime seconds to the platform.

<NumberRetry>2</NumberRetry>

Configures the number of attempts to upload to the server.

<Icon>

<Path>Images\Subida.gif</Path>

Configures the address of the upload icon. This icon is displayed in the notification area.

<Message>Uploading file to Central Platform</Message>

Configures the message that will be displayed in platform events when uploading data.

</Icon> </upload> <rollback>

<password>82ZuX+E=</password>

Shows the coded password of rollback.

</ rollback >

The IRM Windows applications (IRS console and configuration) have different types of security:

Authentication integrated with Windows. Only those users that are system administrators can access the applications.

Authentication IRM. The applications will request authentication on initiation, (as defined in the general section of the present file).

Authentication ODP. The applications will request authentication on initiation. This will be a key obtained through the ODP/OTP tools.

<security> <authentication> <Windows>1</Windows>

Authentication of Windows, if it is 1 the value is true and if it is 0, false.

(15)

<Url>

<Protocol>ghttp</Protocol> <Host>ECCWEB48</Host>

Public IP or DNS of the server where the Remoting module is to be found.

<Port>80</Port>

Remoting Port

<Dir>Fractalia/IRM/IRMRemotingServiceHost</Dir>

Path to find the RemotingServiceHost folder in the Server

<Resource>IrmRemotingService.rem</Resource> </Url>

</remotingChannel> <TerminalControlServer> <Enabled>true</Enabled>

Enable or disable the Callback Port.

<CallBackPort>27027</CallBackPort>

Inserts the port that is going to function as callback. </TerminalControlServer>

<information>

<CallInterval>15</CallInterval> </information>

This is the time interval, in minutes, with which the information module calls the platform.

<remoteConfig>

<CallInterval>15</CallInterval> </remoteConfig>

This is the time interval, in minutes, with which the configuration module calls the platform.

<remoteControl>

<Password>82ZuX+E=</Password>

Shows the remote control codified password.

<Port>5900</Port>

Configures the remote control port.

<MSSecurity>0</MSSecurity>

Security is integrated with Windows, if it is 1 the value is true and if it is 0, false.

</remoteControl> </remoteConfig> <actualizacion> <Password>82ZuX+E=</Password> </actualizacion>

2. Updates.xml

(16)

This file allows the configuration of the download parameters of the client. It is to be found in the directory:

“%PROGRAMFILES%\Iriscene Remote Manager\4.8" <P2P_Temp>d:\IRM\p2p\temporal</P2P_Temp>

Configures the path where the temporary files are going to be stored.

<Shared_Path>d:\IRM\p2p\shared</Shared_Path>

Configures the path where the downloaded updates are going to be stored.

<Shared_Mb>2048</Shared_Mb>

Configures the maximum folder size where the updates are going to be downloaded.

<Share_Files>1</Share_Files>

Indicates the number of updates that have been downloaded from the platform.

<Path_ini>d:\IRM\p2p\ini</Path_ini>

Configures the path where the download configuration files are going to be stored. The download configuration files are stored in the server with the extension .ini.

<Shared_HTTPServerPort>8182</Shared_HTTPServerPort>

Configures the server port for TCP protocol petitions. It is the port for sharing the P2P files.

<Mirror>0</Mirror>

Shows if the client is in Mirror mode. If it is in Mirror mode it will show a 1 and, if not, a 0.

<WAN>1</WAN>

Shows if the client is in WAN mode. If it is in WAN mode it will show a 1 and, if not, a 0.

<LAN>1</LAN>

Shows if the client is in LAN mode. If it is in LAN mode it will show a 1 and, if not, a 0.

<BroadcastPort>20082</BroadcastPort>

Configures the server port for UDP protocol petitions. It is necessary to be able to share P2P files. <Icons> <Icon Name="Download"> <Path>Images\Descarga.gif</Path> <Message>Downloading updates</Message> </Icon> <Icon Name="Installation"> <Path>Images\Instalando.gif</Path> <Message>Installing updates</Message> </Icon> </Icons>

Configures the images and messages that will be shown during and after the download of updates.

Configures the path where the contents for Iriscene Public Media are left when they are received from Iriscene Remote Manager.

<SpeedLimit>

<! -- Speed limit is in Bytes per second (BPS) --> <Download>-1</Download>

<Upload>-1</Upload> </SpeedLimit>

Configures the bandwidth, in bytes per second, of uploading and downloading updates. If the value is -1 bandwidth control is inactive.

(17)

4. SelfServiceTool.exe.config

This file allows you to configure the path for the platform web service if you have installed the Self Service part in the client. It is in the directory:

“%PROGRAMFILES%\Iriscene Remote Manager\4.8"

<setting name="ProxyWrapper_IRM_Platform_IRM_Service" serializeAs="String"> <value>http://10.110.0.89/Fractalia/IRM/WS_Platform/Service.asmx</value> </setting>

To make the changes correctly you must restart the IRMService.exe service.

5. Registering terminals by command line

Iriscene Remote Manager gives you the possibility to register a terminal by command line instead of having to run the configurator.

To do this you have to access the path by the Windows terminal:

“%PROGRAMFILES%/Iriscene Remote Manager/”

and execute the instruction RegisterTerminal.exe. The format for this instruction is:

RegisterTerminal.exe <WebService> <License>

<WebService>: inserts the URL of the platform WebService.

<License>: inserts the group serial number where you will register the terminal.

To obtain the serial number of the terminal you must access the platform and you get it by clicking, with the right-hand button of the mouse, on the group where you wish to register the terminal, and looking at the properties of the group in the Generic tab (Figure 15).

(18)
(19)

2. Unattended Installation

The basic syntax for unattended installations is the following:

msiexec /i IRS32.msi /qn <Other options msiexec /i IRS32.msi /qn <Other options msiexec /i IRS32.msi /qn <Other options

msiexec /i IRS32.msi /qn <Other options msi msi msi msi> <IRS_OPTION=”value”>> <IRS_OPTION=”value”>> <IRS_OPTION=”value”>> <IRS_OPTION=”value”> <IRS_OPTION=”value”>

<IRS_OPTION=”value”> <IRS_OPTION=”value”> <IRS_OPTION=”value”>

This table contains the options to personalise the IRS default installation options.

Option Description Values By default

TARGETDIR Installation Directory Any valid directory. If no directory exists, it will be created. C: C:C:

C:\\\\%program %program %program %program files% files%files% files%\\\\Iriscene Iriscene Iriscene Iriscene Remote Remote Remote Remote Manager ManagerManager Manager\\\\4.84.84.8\\\\IRS4.8IRSIRSIRS

PASSWORD IRS password Any alphanumeric chain. Admin MAXSNAPSHOTS Maximum number of Recovery Points From 2 to 10. 10 DRIVES Disks to protect Any valid disk Active disk (normally C:) BOOTMENU Show or hide the load

start menu On | Off On OTP Enable or disable one time Password On | Off On ODP Enable or disable Password for one day

On | Off On

PROTECT Protect or not the disks

0 | 1 1

ROR Specifies the

disk to configure the restore on restarting /none | any valid disk /none

(20)

CONFIGLOG Specifies the log file path

for the configuration

phase

/none | any valid file (If exists it will be overwritten) /none <Other <Other <Other

<Other msi msi msi msi op op op optiontiontionstionsss >>>>

Option Description

/norestart No restart after installation (NOT RECOMMENDED)

/l* log_file Normal installer log (NOT of the IRS protection)

/lx log_file Detailed installer log (NOT of the IRS protection)

Note: If the “User Access Control” (UAC), a Windows Vista improvement, is active the installation process must have high administrator permissions or the installation will be cancelled, as the Windows Installer does not allow silent installation without said permissions.

Examples

To Install IRS in C:\IRS and the results of the detailed log in C:\irs_install.log

msiexec /i IRS32.msi /qn /lx c: msiexec /i IRS32.msi /qn /lx c:msiexec /i IRS32.msi /qn /lx c:

msiexec /i IRS32.msi /qn /lx c:\\\\irs_install.log TARGETDIR=”c:irs_install.log TARGETDIR=”c:irs_install.log TARGETDIR=”c:irs_install.log TARGETDIR=”c:\\\\IRS”IRS”IRS”IRS”

To Install IRS, protected disks C: and D: and without rebooting:

msiexec /i IRS32.msi /qn DRIVES=”c: d:” /norestart msiexec /i IRS32.msi /qn DRIVES=”c: d:” /norestartmsiexec /i IRS32.msi /qn DRIVES=”c: d:” /norestart msiexec /i IRS32.msi /qn DRIVES=”c: d:” /norestart

To Install IRS but not protect any disk:

msiexec /i IRS32.msi /qn PROTECT=”0” msiexec /i IRS32.msi /qn PROTECT=”0” msiexec /i IRS32.msi /qn PROTECT=”0” msiexec /i IRS32.msi /qn PROTECT=”0”

To Install IRS without the boot menu

msiexec /i IRS32.msi /qn BOOTMENU=”Off” msiexec /i IRS32.msi /qn BOOTMENU=”Off”msiexec /i IRS32.msi /qn BOOTMENU=”Off” msiexec /i IRS32.msi /qn BOOTMENU=”Off”

3. Update

Execution of the update in normal mode:

msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus”

Execution of the update in silent mode:

msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” /qn msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” /qn msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” /qn msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=”vomus” /qn

2. Instant Recovery System Command lines

In the path %PROGRAMFILES%\Fractalia\iRollback various applications exist that can be run by a terminal. The syntax is obtained keying in the name of the application without adding any type of parameter:

ActionOnRestart.exe – obtains information of the actions programmed after the reboot or cancels the planned actions.

ActionOnRestart.exe [ <disk ActionOnRestart.exe [ <diskActionOnRestart.exe [ <disk

ActionOnRestart.exe [ <disk----letter> <password> ] get|disableletter> <password> ] get|disableletter> <password> ] get|disableletter> <password> ] get|disable

AutoRollback.exe – activates or deactivates the automatic mode. If it is in automatic mode, each time the machine is rebooted, it returns to a previous Recovery Point.

AutoRollback.exe [ <disk AutoRollback.exe [ <diskAutoRollback.exe [ <disk

(21)

Figure 16. Protect a disk from the IRS configurator

(22)

Figure 18. Insert the IRS password

(23)

Figure 20. Protected disk II

To unprotect a disk press on (Figure 21) and all the disks in the machine that are protected will be displayed (Figure 22). To continue the process you have to mark the disk that you want to unprotect, select the recovery point you want to restore or leave in its present state and insert the IRS password. (Figure 22 and Figure 23). To unprotect a disk you have to reboot the equipment. (Figure 24 and Figure 25)

(24)

Figure 22. Selection of disk and recovery point to restore inserting the IRS password

Figure 23. Unprotect disk I

(25)

Figure 25. Unprotect disk II

Current Status.exe – obtains the latest SnapShot made in the machine and its status.

CurrentStatus.exe CurrentStatus.exe CurrentStatus.exe CurrentStatus.exe

ChangeMode.exe – changes the IRS mode, automatic or manual, on the selected protected disk.

ChangeMode.exe [ <disk ChangeMode.exe [ <disk ChangeMode.exe [ <disk

ChangeMode.exe [ <disk----letter> ] AUTOMATIC|MANUAL <password>letter> ] AUTOMATIC|MANUAL <password>letter> ] AUTOMATIC|MANUAL <password>letter> ] AUTOMATIC|MANUAL <password>

DeleteRecoveryPoint.exe – deletes a Recovery Point.

Delete Delete Delete

DeleteRecoveryPointRecoveryPointRecoveryPointRecoveryPoint.exe [ <disk.exe [ <disk.exe [ <disk.exe [ <disk----letter> <password> ] <recoveryletter> <password> ] <recoveryletter> <password> ] <recoveryletter> <password> ] <recovery----pointpointpointpoint----number>number>number>number>

Disable.exe – returns to the true disk on the next reboot. This action has to be before uninstalling the Instant Recovery System.

Disable.exe [ <disk Disable.exe [ <disk Disable.exe [ <disk

Disable.exe [ <disk----letter> <pletter> <pletter> <password> ] <recoveryletter> <password> ] <recoveryassword> ] <recoveryassword> ] <recovery----pointpointpoint----number> [ /u ]pointnumber> [ /u ]number> [ /u ] number> [ /u ] For

For For

For <recovery<recovery<recovery<recovery----pointpointpointpoint----number> 1 number> 1 number> 1 number> 1 is theis the baseline is theis the baseline baseline and baseline andandand 0 0 0 the present status 0 the present statusthe present statusthe present status /u

/u /u

/u –––– uninstall uninstall uninstall uninstall IRS IRS IRS after rebooting the machineIRS after rebooting the machine, after rebooting the machineafter rebooting the machine, , this, thisthisthis op option op optiontion is only valid fortion is only valid for is only valid for is only valid for <recovery <recovery <recovery----point <recoverypointpointpoint----number> = 0number> = 0number> = 0number> = 0

FixedSnapshot.exe – deactivates the Fixed Recovery Point.

FixedSnapshot.exe [ <disk FixedSnapshot.exe [ <disk FixedSnapshot.exe [ <disk----letter> ] status FixedSnapshot.exe [ <diskletter> ] statusletter> ] status letter> ] status FixedSnapshot.exe [ <disk FixedSnapshot.exe [ <disk FixedSnapshot.exe [ <disk FixedSnapshot.exe [ <disk----letter> <password> ] disableletter> <password> ] disableletter> <password> ] disableletter> <password> ] disable

GetInfo.exe – displays basic information of protected disks.

GetInfo.exe GetInfo.exe GetInfo.exe GetInfo.exe

Getversion.exe– verifies the dll and driver versions of the installation.

GetVersion.exe dll|driver [ <disk GetVersion.exe dll|driver [ <disk GetVersion.exe dll|driver [ <disk GetVersion.exe dll|driver [ <disk----letter> ]letter> ]letter> ]letter> ]

LockRecoveryPoint.exe – blocks or unblocks the recovery point given as an argument.

LockRecoveryPoint.exe [ <disk LockRecoveryPoint.exe [ <disk LockRecoveryPoint.exe [ <disk

LockRecoveryPoint.exe [ <disk----letter> <password> ] <recletter> <password> ] <recletter> <password> ] <rec----pointletter> <password> ] <recpointpointpoint----number> [unlock]number> [unlock]number> [unlock] number> [unlock]

(26)

MaxSnapshot.exe – used to establish the maximum number of snapshots.

MaxSnapshots.exe [ <disk MaxSnapshots.exe [ <diskMaxSnapshots.exe [ <disk

MaxSnapshots.exe [ <disk----letter> <password> ] <maxletter> <password> ] <maxletter> <password> ] <maxletter> <password> ] <max----recrecrecrec----pointpointpoint----count>pointcount>count> count>

MaxSnapshots.exe [ <disk MaxSnapshots.exe [ <disk MaxSnapshots.exe [ <disk

MaxSnapshots.exe [ <disk----letter> ] getletter> ] getletter> ] get letter> ] get

NextRecoveryPoint.exe – creates a new Recovery Point.

NextRecoveryPoint.exe NextRecoveryPoint.exeNextRecoveryPoint.exe NextRecoveryPoint.exe

NextRecoveryPointReboot.exe – programs the creation of a Recovery Point after a reboot of the machine.

NextRecoveryPointReboot.exe NextRecoveryPointReboot.exe NextRecoveryPointReboot.exe NextRecoveryPointReboot.exe

Password.exe – verifies or changes the password.

Password.exe check <password> Password.exe check <password> Password.exe check <password> Password.exe check <password> Password.exe change <old

Password.exe change <oldPassword.exe change <old

Password.exe change <old----password> <newpassword> <newpassword> <newpassword> <new----password>password>password> password>

RestoreToSnapshot.exe – restores the Recovery Point indicated as an argument.

RestoreToSnapshot.exe [ <disk RestoreToSnapshot.exe [ <diskRestoreToSnapshot.exe [ <disk

RestoreToSnapshot.exe [ <disk----letter> <password> ] <recletter> <password> ] <recletter> <password> ] <rec----pointletter> <password> ] <recpointpointpoint----number>|lastnumber>|lastnumber>|lastnumber>|last

Rollback.exe – programs the restoration of a prior Recovery Point for the next reboot.

Rollback.exe Rollback.exe Rollback.exe Rollback.exe

SetBaseline.exe – changes the baseline image to the image corresponding to the number introduced as the argument.

SetBaseline.exe [ <disk SetBaseline.exe [ <disk SetBaseline.exe [ <disk

SetBaseline.exe [ <disk----letter> <password> ] <recoveryletter> <password> ] <recoveryletter> <password> ] <recovery----pointletter> <password> ] <recoverypointpoint----number>pointnumber>number> number>

SnapshotNumber.exe – displays the number of recovery points currently existing in the machine.

Snapshot Snapshot Snapshot

SnapshotNumber.exeNumber.exeNumber.exeNumber.exe

VirtualDiskControl.exe – mounts and unmounts a virtual unit with the Recovery Point indicated as an argument.

VirtualDiskControl mount <virtual VirtualDiskControl mount <virtual VirtualDiskControl mount <virtual

VirtualDiskControl mount <virtual----diskdiskdisk----letter> <protecteddiskletter> <protectedletter> <protected----diskletter> <protecteddiskdisk----letter> <RP>diskletter> <RP>letter> <RP>letter> <RP> VirtualDiskControl unmount <v

VirtualDiskControl unmount <v VirtualDiskControl unmount <v

VirtualDiskControl unmount <virtualirtualirtual----diskirtualdiskdisk----letter>diskletter>letter>letter> where

where where

where <RP> = <recovery <RP> = <recovery <RP> = <recovery <RP> = <recovery----pointpointpoint----number> | fixedpointnumber> | fixednumber> | fixed number> | fixed

1. VirtualDiskControl.exe

This is a command of the Instant Recovery System that allows you to recover the contents of a disk with a damaged Recovery Point.

To do this, before loading the operating system, select in the menu, if you wish to use the preloading console of the IRS operating system in graphic mode (F3 or D) or in text mode (F4 or F).

Graphic mode

Select the protected disk that you want to act on (Figure 26), mark the checkbox “Use Fixed

Recovery Point” and select the Recovery Point from which you want to obtain the information

(27)

Figure 26. Protected disk selection

Figure 27. Use fixed

This action creates a “fixed” Recovery Point, not visible for the user, with the disk contents of the damaged Recovery Point.

Text mode

Select the protected disk that you want to act on (Figure 28), press the F4 or F key to enable the option “Fixed Recovery Point is enabled”, introduce the Recovery Point number that you want recover the information from (Figure 29) and press the escape button.

(28)

Figure 28. Protected disk selection

Figure 29. Use fixed

This action creates a “fixed” Recovery Point, not visible for the user, with the disk contents of the damaged Recovery Point.

There are two possibilities to recover the contents of the disk:

From the command line. You must execute the instruction

VirtualDiskControl.exe mount <Disk unit to mount> <Protected disk unit> fixed

to mount the disk contents from the damaged Recovery Point in a virtual disk.

From the IRS console. Press the button and this will display Figure 30, where you

select the disk you want to mount the disk contents of the damaged Recovery Point.

References

Related documents

[r]

Plant survival of globally engaged firms, such as Swedish MNEs and exporting non- MNEs, seems to be unaffected by increased foreign presence, whereas there appears to be a

This study was conducted to determine if there is a significant relationship between the four year implementation of a Positive Behavior Intervention and Support (SWPBIS) model

“ the seven words of our LORD on

s-process p-process Mass known Half-life known

+CBEDGF HJIKFLI ?© MKNGNGOP MJQMJR S0ODTF VUXWU... ¥¦ü!ޘ§XàKã9ðïòñfáXubÝá˜ê^áno¿ñ1ÝpiUñbâ6Þ ê‚ñbâ ðÜ$øeë3Bëm%Þx

To address these questions, the following goals were set: (a) to reproduce field explosions pertaining to primary blast injury as accurate as possible in a controlled

In memory of Harold Taub, beloved husband of Paula Taub by: Karen &amp; Charles Rosen.. Honouring Maria Belenkova-Buford on her marriage by: Karen &amp;