Guide Acb User
Guide Acb User
Guide Acb User
v6
Users Guide
5 January 2015
Ahsay A-Click Backup
Users Guide
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
Trademarks
Ahsay, Ahsay Online Backup Suite, Ahsay Offsite Backup Server, Ahsay Online Backup Manager, Ahsay A-Click
Backup, Ahsay Replication Server, Ahsay BackupBox Firmware, Ahsay Universal Backup System, Ahsay NAS
Client Utility are trademarks of Ahsay Systems Corporation Limited.
Microsoft, Windows, Microsoft Exchange Server and Microsoft SQL Server are registered trademarks of
Microsoft Corporation.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo and JBoss are registered trademarks of Red Hat, Inc.
www.redhat.com in the U.S. and other countries. Linux is a registered trademark of Linus Torvalds.
All other product names are registered trademarks of their respective owners.
Disclaimer
Ahsay Systems Corporation Limitedd will not have or accept any liability, obligation or responsibility
whatsoever for any loss, destruction or damage (including without limitation consequential loss, destruction or
damage) however arising from or in respect of any use or misuse of reliance on this document. By reading and
following the instructions in this document, you agree to accept unconditionally the terms of this Disclaimer
and as they may be revised and/or amended from time to time by Ahsay Systems Corporation Limitedd
without prior notice to you.
Revision History
Date Descriptions
30 March 2011 First revision of AhsayACB user guide.
Table of Contents
1 Overview............................................................................................................................1
1.1 Conventions .......................................................................................................1
1.2 Definitions, Acronyms and Abbreviations ........................................................1
1.3 System Requirements.........................................................................................2
1.4 Important Notes .................................................................................................2
2 Best Practices and Recommendations ...............................................................................3
2.1 Storage size for the AhsayACB user profile folder ...........................................3
2.2 Encryption..........................................................................................................3
2.3 Backup schedule ................................................................................................3
2.4 Power options - plan settings consideration.......................................................4
2.5 Recovery plan and routine recovery test............................................................4
3 Installing AhsayACB .........................................................................................................5
3.1 Installing AhsayACB on Windows platforms ...................................................5
3.1.1 Installing AhsayACB .........................................................................................5
3.1.2 Installing AhsayACB using the command line (silent mode) ...........................6
3.1.3 Configuring AhsayACB.....................................................................................8
3.2 Installing AhsayACB on Mac OS X platforms................................................10
4 Uninstalling AhsayACB ..................................................................................................12
4.1 Uninstalling AhsayACB on Windows platforms.............................................12
4.2 Uninstalling AhsayACB on Mac OS X platforms...........................................12
5 Using AhsayACB.............................................................................................................13
5.1 System Tray Launcher (Windows Only) .........................................................13
5.2 Logon Dialog ...................................................................................................14
5.3 AhsayACB Main Window...............................................................................18
5.4 User Profile ......................................................................................................20
5.5 About Ahsay A-Click Backup .........................................................................22
5.6 Backup Log......................................................................................................22
5.7 Restore Logs ....................................................................................................23
6 Configure Backup Sets ....................................................................................................25
6.1 Backup Source .................................................................................................25
6.1.1 Backup Filter....................................................................................................27
6.2 Backup Schedule..............................................................................................28
6.3 Backup Setting .................................................................................................29
6.3.1 Continuous Data Protection .............................................................................32
6.3.2 Encryption........................................................................................................34
6.3.3 Temporary Directory .......................................................................................35
6.3.4 Retention Policy...............................................................................................36
6.3.5 User Authentication for Windows ...................................................................36
6.3.6 Advanced Settings ...........................................................................................38
6.3.1.6 Backup File Permissions...................................................................38
6.3.2.6 Follow Link.......................................................................................39
6.3.3.6 Enable Volume Shadow Copy ..........................................................42
6.3.4.6 Enable System Logout Backup Reminder ........................................43
6.3.5.6 Enable off-line backup......................................................................45
7 Backup .............................................................................................................................47
7.1 How data are backed up...................................................................................47
7.2 How to start a backup ......................................................................................48
8 Restore .............................................................................................................................51
1 Overview
1.1 Conventions
Convention Descriptions Example
Bold Important information Important: The encrypting
key is independent from a
backup account's password.
Windows
C:\Program Files\AhsayACB
Mac OS X
/Applications/AhsayACB
Windows XP/2003
C:\Documents and Settings
Windows Vista/2008/7
C:\Users
Mac OS X
Ahsay Systems Corporation Limited 1
Ahsay A-Click Backup
Users Guide
~/.acb
This folder is used for various purposes, such as storage of your backup logs,
user configuration files, temporary delta file and other files of temporary
nature.
Ensure that sufficient disk space is present on the partition which contains
the backup user profile.
2.2 Encryption
The encryption key is very important that it is recommended to write down,
and make additional copies of the key.
Please store the key in safe location so that it is readily available when
needed to restore data.
For maximum security, please select an encryption key with more than 8
characters, containing at least two of the following three character groups:
When the computer moves out of the low power state, AhsayOBM will not
execute the missed backup job. This can lead to missed backup.
If a backup job is running when the computer enters low power state,
AhsayOBM cannot prevent the computer from going into hibernation.
Consider performing routine recovery test to ensure your backup is setup and
performed properly. Performing recovery test can also help identify potential
issues or gaps in your recovery plan.
For best result, it is recommended that you keep the test as close as possible
to a real situation. Often times when a recovery test is to take place, user will
plan for the test (e.g. reconfigure the test environments, restoring certain
data in advance). For real recovery situation, you will not get a chance to do
that.
3 Installing AhsayACB
This chapter describes how to install the backup client application.
Method 1 - Use the Installation Wizard, which guides you through the
installation process.
3. When completed, a system tray icon for AhsayACB will be installed, and
AhsayACB will be launched automatically.
Syntax:
acb-win.exe [{/SILENT | /VERYSILENT}] [{/LANG=xx}]
[{/TASK="option"}]
Parameter Description
/SILENT Install the backup application showing the
installation process.
Value Description
xx Abbreviations of the language to install the backup
application in (e.g. en, it, fr).
4. Press Enter.
5. Optional - If you do not have a backup user account, you can register
for a trial user account with the following steps:
6. If you already have a backup user account, select [Already a user?] and
logon to the server with your existing login credentials.
7. For first time login, you will be guided to create a backup set:
Select an encryption setting for your backup set. Accept the default
encryption settings (using the backup user accounts password string
as encrypting key) if no change is necessary.
8. Optional - If you do not have an backup user account, you can register
for a trial user account with the following steps:
9. If you have a backup user account already, select [Already a user?] and
logon to the server with your existing login credentials.
10. For first time login, you will be guided to create a backup set:
Select an encryption setting for your backup set. Accept the default
encryption settings (using the backup user accounts password string
as encrypting key) if no change is necessary.
*For further details of each step, please refer to the following chapters.
4 Uninstalling AhsayACB
This chapter describes how to uninstall the backup client application.
2. Open Start menu, select [Control Panel] and [Add or Remove Programs].
3. Select [Ahsay A-Click Backup] from the list and press the [Remove]
button.
>cd $AhsayACB_HOME/bin
>sudo ./uninstall.sh
5 Using AhsayACB
This chapter describes the various features available in the backup client
application.
Right clicking on the AhsayACB system tray icon will display a menu,
providing the following functions:
Backup and Logoff Click to perform backup for a specific backup set in
silent background mode and logoff from Windows
when the job is completed.
Backup and Restart Click to perform backup for a specific backup set in
silent background mode and restart Windows
when the job is completed.
Backup and Shutdown Click to perform backup for a specific backup set in
silent background mode and shutdown Windows
when the job is completed.
Backup and Standby Click to perform backup for a specific backup set in
silent background mode and enter the Standby
mode of Windows when the job is completed.
Backup and Hibernate Click to perform backup for a specific backup set in
silent background mode and enter the Hibernate
mode of Windows when the job is completed
Stop running backup Click to stop a running backup job chosen from the
sub-menu.
*The availability of options listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
http / https Drop down menu for selecting http or https protocol
when connecting to the backup server.
Proxy Setting Input area for entering proxy setting such as address,
port, proxy username and password.
Ahsay Systems Corporation Limited 14
Ahsay A-Click Backup
Users Guide
Login Name Input box for entering trial backup user login name.
Contact Input box for entering trail backup user email contact.
Already a user? Click to access the login dialog, for user with backup
user account already.
*The availability of options listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
*The availability of options listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Press the [Option] button to access the [Language], [Backup Server] and
[Proxy setting] settings.
For backup server that accepts connection on custom port only, append the
hostname or IP address in the [Backup Server] field, by adding a semi-colon
(:) and the custom port number at the end. For example:
backup.server.com:8080 or 192.168.1.1:8443
For security concerns, you can configure the backup client application to
communicate with the backup server in SSL protocol (Secure Socket Layer),
select [https] from the dropdown menu at the [Backup Server] section.
Enter your login credentials in the [Login Name] and [Password] fields.
If you do not remember your password, press the [Forgot your password?]
button to retrieve a forgotten password email.
To enable [Proxy setting], select the [Use proxy to access the backup server]
checkbox button, and enter the corresponding proxy information. For [Sock]
proxy, both v4 and v5 without user authentication are supported.
For initial login of existing backup user on new computer, you will be
prompted for the encrypting key of all existing backup set.
This would allow data backed up in the future to be restore-able (as they are
no longer encrypted), but existing data that are already encrypted by the lost
encrypting key would not be restore-able.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
To access the user profile dialog, click on the [User Profile] button at
the applications main window.
Name Input box for entering contact name of the backup user
account.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
You can change the backup user accounts password, by pressing the
[Change] button to open the [Change Password] dialog.
Enter your [Old Password] (e.g. existing password) and [New Password] into
the corresponding textbox and press [OK].
To change the backup user accounts time zone setting, select the
corresponding time zone from the [Time Zone] drop down menu.
To update the contact information of the backup user account, you can enter
the corresponding information such as [Name] and [Email] in the
corresponding field, and press [OK].
Logs per page Drop down menu for selecting the number of log entries to
display per page.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Logs per page Drop down menu for selecting the number of log entries to
display per page.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
A Backup Source defines the files and directories to be included for backup.
On the basic backup source selection dialog, you can select directories that
are commonly selected as backup source for backup:
Desktop folder
My Documents folder
Favorites folder
Outlook and Outlook Express folder
The checkbox beside a root drives, directory or file can be in one of the
following mode:
Mode Description
All directories and files under this directory will be backed up.
All directories and files under this directory except those explicitly
excluded will be backed up.
Only the checked directories and files under this directory will be
backed up.
Directories and files selected to this directory in the future will not
be backed up.
Note: For installation on Windows platforms, hidden directories and files will
be displayed only if the [Hide protected operating files] setting of Windows
Explorer is disabled.
By selecting a parent directory as backup source, all child directories and files
including any hidden directories or files would be backup as well.
To avoid backing up hidden directories such as the Recycle Bin folder, please
select the corresponding directories or files required as backup source directly,
instead of selecting the parent directory or root drive letter.
Click on the [Backup Filter] button at the advanced backup source dialog to
configure the backup filter of a backup set.
File name extension Textbox to enter the file name extension to include or
exclude as backup source.
source.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Click on the button and browse to the directory which the filter is intended for.
For example, to automatically include all Words document files within the
selected directory, enter the file extension of Words document (e.g. .doc) in the
File name extension field and press [Add].
Select [Include matched] as filter mode and then click on the [OK] button, and
all Words document files within the corresponding directory will be included as
backup source automatically.
There is no need to select each Word document files within the advanced backup
source dialog manually.
A Backup Schedule defines the time, time period allowed, and frequency that
backup job for an existing backup set should be run automatically.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Backup file(s) selected by backup Radio button to select if CDP will only
sources and filters backup modified directories or files
selected as backup source.
Do not backup files defined as system When this option is enabled, CDP will
files automatically exclude the following
files from its backup:
C:\hiberfil.sys
C:\Pagefile.sys
C:\Program Files\*
C:\RECYCLER
C:\System Volume Information
C:\Windows\*
${App_Data}\Avg7
${App_Data}\Avg8
${App_Data}\Kaspersky Lab
${App_Data}\McAfee
${App_Data}\McAfee.com
${App_Data}\Microsoft
${App_Data}\Sophos
${App_Data}\Symantec
*\*.tmp
*\Application Data\Macromedia\*
*\Application Data\Mozilla\*
*\Local Settings\Application
Data\Microsoft\*
*\ntuser.dat
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
To configure CDP for backup of the directories and files selected as backup
source, select the [Backup file(s) selected by backup sources and filters]
option.
To configure CDP for backup of all local drive(s) (all files that are updated
after CDP is enabled), select the [Backup all files] option.
1. It prevents loss of data as the modified contents of the files are backed
up automatically in close to real-time.
Although CDP can be a helpful feature, the protection offered by CDP is often
heralded without consideration of the disadvantages that it can present.
Specifically, the continuous CPU, memory and bandwidth usage can adversely
affect the corresponding machines performance.
Also note that CDP is not a replacement for the traditional schedule backup
feature but works along with the scheduled backup to provide timely
protection for your data.
Note: It is not possible to run multiple CDP backup sets on the same machine
with different backup user accounts.
6.3.2 Encryption
Before files are uploaded to the backup server, they are first compressed and
encrypted with a key of your choice.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Encryption settings are set at a backup sets creation time and cannot be
modified afterward. It is not possible to modify encrypting key
afterward.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
By selecting the [Default] encryption setting, you will be using the backup
user accounts password string as the encrypting key for this backup
set.
If you are entering your own encrypting key, please considering selecting an
encryption key with more than 8 characters, containing at least two of the
following three character groups:
These temp files are stored in the directory specified under [Temporary
Directory for storing backup files].
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
To change the directory storing these temp files, click on the [Change] button.
The temporary directory configured can be a local drive as well as a network
drive.
Ahsay Systems Corporation Limited 35
Ahsay A-Click Backup
Users Guide
For network shared drive configuration, specify the UNC path (e.g.
\\${Server-name}\share) to the network location, and enter the login
credentials of a Windows account with sufficient permission to access the
network drive in the [User Authentication for Windows] field.
Please ensure that there is sufficient disk space on the partition which
contains the AhsayACB user profile folder.
Retention policy will only affect retained files, for example files that have
already been deleted or updated from your computer.
For those files that have not been updated on your computer, they will be
kept in the current area on the backup server and they will not be affected by
the setting of retention policy.
These backup copies of unchanged files will stay on the backup server until
the original files are removed or modified from your computer.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
To change the retention policy setting of a backup set, input the required
number of days, or select the number of days available under the drop down
menu.
backup (by default the backup application services run as Local System,
which does not have permission for network resource).
User Name Input box for entering username of the Windows domain
account.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Please also modify the Log On account of the backup applications scheduler
service.
This will allow the backup application to access the network shared drive for
backup.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Note that file permission may not be restore-able depending on the restore
destination (e.g. on the same computer or on a different computer with
different operating system or different user setup).
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
When the follow link option is enabled, not only is the symbolic link or
junction point backed up, but directories and files that the junction point links
to will also be backed up.
Restore outcome would be different with the different setting used during
backup and during restore (e.g. there is a follow link option for backup and a
follow link option in the restore menu).
To enable the [Follow Link] option, select the checkbox beside the follow link
option.
Note that system protect junction point such as the Documents and Settings
junction on Windows 2008 server cannot be selected as backup source under
the advanced backup source dialog (e.g. there is no select-able checkbox
beside system protected junction point).
To manually select system protected junction points for backup; please select
the parent directory of the junction point, or contact your service provider for
assistance.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
Enabling the Volume Shadow Copy option will allow backup of local files that
are exclusively opened during the backup process (e.g. Outlook PST file).
Volume Shadow Copy can only be applied for local drive; exclusively
opened file on network shared drive cannot be backed up even with the
Volume Shadow Copy option enabled.
http://technet.microsoft.com/en-us/library/cc785914(WS.10).aspx
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
job is completed.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
The [off-line backup] feature is designed for notebook users who may be off-
line most of the time, and cannot rely on backup scheduled for regular
backup of their data.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
With the [off-line backup] setting is enabled, when the computer is connected
online and the time between the last backup to the current time elapsed the
[Backup Interval], a pop up off-line backup confirmation menu will be
prompted, reminding the user to perform a backup.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
7 Backup
This chapter describes how to perform a backup job using the backup client
application.
2. A Shadow Copy set of the backup source volume is created (if available).
4. Data of the backup source is compared with the server file list to compile
the following file lists:
Note: Only modified part of a file (delta file) is uploaded to the backup
server, reducing the time required to complete the backup job.
6. Data are encrypted, compressed, and then uploaded onto the backup
server.
7. The Shadow Copy set of the backup source is removed (if necessary).
Note: Scheduled backup job may be missed if the client computer is switched
off, in hibernated, standby mode. Please ensure that the computer is not in
the mode stated above at the scheduled backup time.
8 Restore
This chapter describes how to perform a restore using the backup client
application or web console.
5. All the data will be decompressed and decrypted on the backup client
computer.
6. Merging of delta files (for file with multiple delta files, if necessary).
Show all files Radio button to display all files available for restore.
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
For example, to display the files available for restore since the backup job
performed on 11:00am Mar 11th, 2011. Select [Show files as of Job],
[2011/03/11] and [11/00/00]
Alternatively, select the [Show all files] to display all files available for restore.
For restore to the original location on the client machine, select the [Original
location] radio button.
8.1.1.1 Filter
Click on the [Filter] button to expand the filter option.
[contains]
[exact]
[starts with]
[ends with]
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
The [Filter] option is useful when you want to restore only files that follow a
certain pattern. For example, Microsoft Words document file that ends
with .doc only.
Enter the pattern .doc into the [Pattern] textbox, select type [ends with]
from the [Type] dropdown menu, and click [Apply].
8.1.2.1 Search
Click on the [Search] button to open the filter menu.
Pattern Input box for entering the pattern of files that you
would like to search for.
[contains]
[exact]
[starts with]
[ends with]
Ahsay Systems Corporation Limited 55
Ahsay A-Click Backup
Users Guide
*The availability of features listed above may be service provider dependent. If a feature is not available,
please check with your service provider for further details and availability.
The [Search] option can be used to locate a directory or file within a backup
set with large amount of data. When the search is completed, user can select
the data for restore in the search menu.
For restore that follow a certain pattern, for example, Microsoft Words
document file that ends with .doc only. Enter the pattern .doc into the
[Pattern] textbox, select type [ends with] from the [Type] dropdown menu,
and click [Apply].
When the [Delete extra files] option is enabled, the restore process will
attempt to synchronize the selected restore source with the restore
destination.
In the image above, where C:\ is selected as the restore source, and
[Original location] is selected as the restore destination.
Specifically, the restore process will restore the Application, Documents and
Settings folders and the data within, and then delete all other data on C:\ to
mirror the restore source and destination.
Prior to the data synchronization, the backup application will prompt for
confirmation:
When using the [Delete extra files] option, please select the lowest possible
child directories or files, instead of the highest parent directories for
synchronization.
When the follow link option is enabled, not only is the symbolic link or
junction point restored, but directories and files that the junction point links
to will also be restored.
Note that the resolve link option is only available when the restore
destination is configured to [Alternate location], and [Resolve Link] must be
used in conjunction with the [Follow Link] option.
When the resolve link option is enabled, the junction point would be restored,
and directories and files that the junction point links to will also be restored.
This option is useful for removing backed up directories or files on server that
is no longer required.
Select the checkboxes beside the corresponding directories or files that you
would like to delete, and click [Delete].
Ahsay Systems Corporation Limited 60
Ahsay A-Click Backup
Users Guide
Prior to the data removal, the backup application will prompt for confirmation:
Important: Files will no longer be available for restore after they are
deleted from the backup server.
Refer to the following steps for restore using the backup applications
user interface:
For example, to display the files available for restore since the backup
job performed on 11:00am Mar 11th, 2011. Select [Show files as of Job],
[2011/03/11] and [11/00/00]
Select the [Show all files] to display all files available for restore.
5. Make use of the other options such as [Filter], [Search] and [Advanced]
option available, more details can be found in the sections above.
6. For restore to the original location on the client machine, select the
[Original location] radio button.
2. Click on the [File Explorer] tab at the top menu of the web interface.
For example, to display the files available for restore since the backup
job performed on 11:00am Mar 11th, 2011. Select [Show files as of Job],
[2011/03/11] and [11/00/00]
Select the [Show all files] to display all files available for restore.
7. Make use of the other options such as [Filter], [Search] and [Advanced]
option available, more details can be found in the earlier sections of this
guide.
8. For restore to the original location on the client machine, select the
[Original location] radio button.
This can only be done by the administrator of the backup server. Please
consult your service provider for more information on this option.
9 Email Reporting
This chapter describes the various email reports sent by the backup server to
the backup user.
Sample Report
Key Description
Getting started Download link to download the backup application.
*The availability of report listed above may be service provider dependent. If a report is not available,
please check with your service provider for further details and availability.
User can request for a forgotten password email by clicking on the [Forgot
your password?] button on the backup applications login dialog, or the
[Forgotten your password?] button on the web console login page.
Sample Report
Key Description
User Setting User setting information including:
The hashed password can be used for login to the web console, or the backup
application user interface.
After logging into the backup application, the user will be prompted to reset
the password.
Sample Report
Key Description
Backup Time The time when the backup job ran.
Job Status The overall status of the backup job. Normally, you should
see Backup finished successfully in this field. If you
happen to get something else, please consult the attached
full report for more information.
New Files Total number and size of backup files added to your
backup set.
Updated Files Total number and size of backup files updated in your
backup set.
Updated Access Total number and size of backup files with file permission
Ahsay Systems Corporation Limited 74
Ahsay A-Click Backup
Users Guide
Data Area The total backup data stored in the data area.
Retention Area The total backup data stored in the retention area. Old
copies of updated or deleted backup files are retained in
the retention area for the number of days as specified by
the retention policy of the backup set before they are
removed from the system.
Backup Quota Backup quota
Remaining Remaining quota
Quota
The full backup report, which contains a full listing of all files backed up by
the backup job, is attached to the backup job report email as a zip file. You
need to unzip it before you can read the full report.
Sample Report
Key Description
Login Name Login name
Backup Set The name of the backup set.
Backup Job The name of the backup job (which is the start time of the
backup job).
Job Status The overall status of the backup job. Normally, you should
see Backup finished successfully in this field. If you
happen to get something else, please consult the attached
full report form more information.
Backup Time The time when the backup job ran.
Backup Logs All messages logged when running this backup job.
New Files Total number and size of backup files added to your
backup set.
Updated Files Total number and size of backup files updated in your
backup set.
Permission Total number and size of backup files with file permission
Update Files updated in your backup set.
Deleted Files Total number and size of backup files deleted from your
backup set.
Moved Files Total number and size of backup files relocated in your
backup set.
Copied Files Total number and size of backup files copied to another
location in your backup set.
New File List Full list of all backup files added to your backup set.
Updated File List Full list of all backup files updated in your backup set.
Permission Full list of all backup files with file permission updated in
Updated File List your backup set.
Deleted File List Full list of all backup files deleted from your backup set.
Moved File List Full list of all backup files relocated in your backup set.
Copied File list Full list of all backup files copied to another location in
your backup set.
Sample Report
Key Description
Login Name Login Name
Alias Alias
Language Preferred Language for your backup reports
Contact Email Address that will be used to contact you.
Backup Quota Backup Quota
Sample Report
Key Description
Login Name The login name of the user.
Alias Alias
Language Preferred Language for your backup reports.
Contact Email Address that will be used to contact you.
Last Login Time The last time you logon to the backup system.
Last Backup Time The last time you ran a backup job.
10 Web Features
Other than the features of AhsayACB described in previous chapters, the web
interface of AhsayOBS provides you access to some additional features that
are not available in AhsayACB. This chapter describes each of these features
in details.
Key Description
Job Status The overall status of the backup job. Normally, you should
see Backup finished successfully in this field. If you
happen to get something else, please click the [Detailed
Report] image on the page.
Backup Time The time when the backup job ran.
New Files Total number and size of backup files added to your backup
set.
Updated Files Total number and size of backup files updated in your
backup set.
Permission Total number and size of backup files with file permission
Updated File updated in your backup set.
Deleted Files Total number and size of backup files deleted from your
backup set.
Moved Files Total number and size of backup files relocated in your
backup set.
Copied Files Total number and size of backup files copied to another
location in your backup set.
Data Area The total backup data stored in the data area.
Retention Area The total backup data stored in the retention area. Old
copies of updated or deleted backup files are retained in the
retention area for the number of days as specified by the
retention policy of the backup set before they are removed
from the system
Total Upload Total number and size of backup files uploaded to the
backup server.
Backup Quota Backup Quota
Remaining Remaining Quota
Quota
You can open the [Full Backup Report] to review all information logged by a
backup job by clicking the [Detailed Report] image on the [Report] panel.
Key Description
Login Name The login name of the user.
Backup Logs All messages logged when running this backup job.
New Files Total number and size of backup files added to your
backup set.
Updated Files Total number and size of backup files updated in your
backup set.
Permission Total number and size of backup files with file permission
Updated Files updated in your backup set.
Deleted Files Total number and size of backup files deleted from your
backup set.
Moved Files Total number and size of backup files relocated in your
backup set.
Copied Files Total number and size of backup files copied to another
location in your backup set.
New File List Full list of all backup files added to your backup set.
Updated File List Full list of all backup files updated in your backup set.
Permission Full list of all backup files with file permission updated in
Updated File List your backup set.
Deleted File List Full list of all backup files deleted from your backup set.
Moved File List Full list of all backup files relocated in your backup set.
Copied File List Full list of all backup files copied to another location in
your backup set.
Key Description
Date The date that the following statistics are collected.
Data Area Total number and size of backup files stored in the data
area on a particular date.
Retention Area Total number and size of backup files stored in the
retention area on a particular date.
Uploaded Size Total number and size of backup files uploaded to the
backup server on a particular date.
Total Storage Total number and size of backup files stored under your
backup account on particular date.
Appendix
Appendix A Supported Languages
Language Code Language
bg Bulgarian
ca Catalan
cs Czech
da Danish
de German
el Greek
en English
el Spanish
eu Basque
fi Finnish
fr French
hu Hungarian
is Icelandic
it Italian
iw Hebrew
ja Japanese
ko Korean
lt Lithuanian
nl Dutch
no Norwegian
po Polish
pt_BR Portuguese (Brazil)
pt_PT Portuguese (Portugal)
ro Romanian
ru Russian
sl Slovenian
sv Swedish
th_th Thai (Thai Digit)
tr Turkish
zh_CN Chinese (Simplified)
zh_TW Chinese (Traditional)