This message means the connection was corrupted over the network, and Anti-Cloud Backup & Restore's network library closed the connection.
This can happen because of random network conditions. Retrying the operation should fix the issue.
If the issue keeps happening repeatedly, this message indicates that something is interfering with packets in your network.
You should ensure that the necessary VDI .dll
files are registered and are the correct version for your SQL Server installation. You can use Microsoft SQL Server Backup Simulator to check the status of the VDI .dll
files.
An "Access Denied" error message means that the Windows user account running the backup job does not have access to read the file content.
Current versions of Anti-Cloud Backup & Restore automatically creates a service account with all necessary permissions to read local files. If you are experiencing "Access Denied" errors, you may be trying to back up a network path that has been mounted as a directory. Please see the "Accessing Windows network shares and UNC paths" section below for more information. If you are experiencing "Access Denied" errors and you are certain that you are not backing up a mounted network path, please contact support. You may also be trying to backup a local Protected Item to which the backup software does not have read-access, such as a file within a user's home directory. In this case, you will need to alter the backup delegate service, and change it to 'logon as' an account which does have access to the Protected Item.
Anti-Cloud Backup & Restore is a safe application. Any such detection is a "false positive".
In this situation, there are some actions you can take:
This error message indicates that something on the PC is blocking Anti-Cloud Backup & Restore's main backup-tool.exe
program from running. It's likely this is the antivirus. Please follow the above steps to allowlist Anti-Cloud Backup & Restore in your antivirus application.
You will receive the "FileRepMalware" error message for any file that was
You can resolve this issue by purchasing and installing an Authenticode certificate.
Bitdefender may flag the desktop client software, you can create an exclusion policy on Bitdefender to prevent this from happening.
For the client installation files, you may or may not be required to install from the root directory. You can simply create a folder on each machine to put the installation files into. Exclusions should look similar to this:
C:\example\*
C:\example\*
C:\Windows\Temp\*\*\install.exe
C:\Users\*\AppData\Local\Temp\install.exe
C:\example\install.dat
C:\example\install.exe
C:\Windows\Temp\*\*\install.exe
C:\Users\*\AppData\Local\Temp\install.exe
If Bitdefender is still flagging Anti-Cloud Backup & Restore when trying to use it, then exclude the following:
C:\Program Files\Anti-Cloud Backup & Restore\*
C:\Program Files\Anti-Cloud Backup & Restore\*
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Anti-Cloud Backup & Restore.lnk
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Anti-Cloud Backup & Restore (Background Tasks).lnk
C:\Program Files\Anti-Cloud Backup & Restore\backup-interface.exe
C:\Program Files\Anti-Cloud Backup & Restore\backup-mssql.exe
C:\Program Files\Anti-Cloud Backup & Restore\backup-service.exe
C:\Program Files\Anti-Cloud Backup & Restore\backup-tool.exe
C:\Program Files\Anti-Cloud Backup & Restore\dispatchmgr.exe
C:\Program Files\Anti-Cloud Backup & Restore\unelevate.exe
C:\Program Files\Anti-Cloud Backup & Restore\Uninstall.exe
C:\Program Files\Anti-Cloud Backup & Restore\launch.exe
Anti-Cloud Backup & Restore uploads files to the Anti-Cloud Backup & Restore Server over the internet. Occasionally, you may see errors such as the following:
Couldn't save data chunk:
HTTP/1.x transport connection broken
net/http: request canceled (Client.Timeout exceeded while awaiting headers)
wsarecv
wsasend
An existing connection was forcibly closed by the remote host
dial tcp: lookup [...]: no such host
connectex: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Anti-Cloud Backup & Restore retries the upload several times, but eventually gives up. After a failed data chunk upload, you may see several more messages of the form Couldn't save data chunk: context canceled
while Anti-Cloud Backup & Restore terminates the other upload threads.
Network errors have many possible causes:
To troubleshoot these issues, please check:
Does the backup succeed if it is retried?
Does the error message always happen at a certain time of day?
Anti-Cloud Backup & Restore can back up Windows network paths, and back up to Windows network storage (SMB / CIFS). However, because Anti-Cloud Backup & Restore runs as a service user, there are some issues with authentication to be aware of.
Please note that if you are using Anti-Cloud Backup & Restore to back up data from a network device, you should prefer to install Anti-Cloud Backup & Restore directly on the device instead of backing it up over the network. This will also significantly improve performance, as less data needs to be transferred over the LAN.
On Windows, each logged-on user session has its own set of mapped network drives. The service user account is unlikely to have any mapped drives. If you see error messages like WARNING Missing: 'Z:\'
, this is probably the reason. You can work around this by using a UNC path instead.
The Anti-Cloud Backup & Restore desktop application will automatically convert mapped network drives to their UNC path equivalents.
If the UNC share requires authentication, the service user account is probably not logged-in to the UNC share. If you see error messages like WARNING Lstat: CreateFile \\?\UNC\...: Access is denied.
, this is probably the reason.
Some individual software, while it is launched from the within the users session, it may elevate itself when running or run under the System user account. If this happens, the encryption keys will not be available to that software's process and access will be denied to the containers.
Example scenarios where the above behavior may be experienced are when software is running under a different user context within the users session. Anti-Cloud Backup & Restore runs the backup as a service user account (usually "NT SERVICE\backup.delegate" or "LOCAL SYSTEM" in some cases). The DESlock virtual drive is unavailable for other user accounts on the system.
It's possible to mount a virtual disk globally so all users on the system will be able to access its contents. This is done using the [DESlock+] command line tool
Follow DESlock's own instructions to mount the drive for all users.
Source: https://support.deslock.com/index.php?/Default/Knowledgebase/Article/View/244
Error "VSS Error: Couldn't take snapshot. The shadow copy provider had an unexpected error while trying to process the specified operation"
Possible causes for this error include:
Backing up mapped network drives. You cannot use VSS on network share.
Shadow storage on the source drives is not configured or not large enough. The shadow storage size can be checked and manually changed through command prompt:
vssadmin list shadowstorage
vssadmin Resize ShadowStorage /For=X: /On=X: /Maxsize=XX%
Microsoft's native snapshot manager is only able to perform one snapshot at a time. If a snapshot process is already running when the backup job starts, then the backup job could fail. Stopping and restarting the Volume Shadow Copy service can resolve this problem. To do this, open an elevated command prompt window and run the following commands:
net stop vss
net start vss
A reboot of the server has also been known to clean up the snapshot manager correctly, should a service restart not resolve the issue.
Multiple backup products installed could cause this error. Many backup solutions have their own proprietary snapshot manager which can cause conflicts with other backup solutions installed on the system.
VSS snapshots have been known to fail because an advanced format drive is connected to the machine.
Check you have all the VSS writers installed and working. On an elevated command prompt: vssadmin list writers
If you're still having issues, please open a support ticket with your results on the above troubleshooting.
When using the "MX Direct" option to send email, your Anti-Cloud Backup & Restore Server is acting as an MTA (Mail Transfer Agent) to deliver the email directly to the recipient. There are strict requirements on MTAs to not have your outgoing emails discarded as spam.
You may find more information online about running an email server and not having your messages discarded as spam. The advice following are only general guidelines:
Many email servers will maintain a list of known-bad IP ranges that have served spam emails in the past. If you are hosting Anti-Cloud Backup & Restore Server on a cloud VPS or cloud server, it's likely that the IP address has been used by someone else in the past. This is especially likely with the very small size of the IPv4 internet.
Some IP reputation services allow you to submit your IP address for removal.
At the time of writing, the following web services allow you to check if your IP address is on an email spam denylist:
Reverse DNS is a system where, for an IP address 1.2.3.4
, looking up the special domain name 4.3.2.1.in-addr.arpa
produces a TXT
record explaining the owner of the 1.2.3.4
IP address.
One anti-spam measure in email is Forward Confirmed Reverse DNS (FCrDNS). Looking up the DNS of the reverse DNS should produce the original domain name again. This is a method of ensuring that the domain name owner is also the IP address owner, an important authenticity check for anti-spam.
Many cloud server providers will automatically configure the RDNS record to a suitable value. However, by changing it to match your domain name exactly, you may help ensure the email delivery is successful. If you do not have the access necessary to configure reverse DNS then you will need to find out who owns your IP block (usually this is your ISP or hosting provider) and contact them to configure it.
Read more about FCrDNS:
SPF (Sender Policy Framework) is a system that allows your domain name to restrict which servers are allowed to send email messages on behalf of that domain to a set of allowed mail servers. An SPF record is added to your domain's DNS zone file as a TXT record and it identifies authorized SMTP servers for your domain.
Generally speaking, and SPF policy will only block emails; lack of an SPF policy does not reduce deliverability rates. However, you may have an existing SPF policy added for your existing domain email provider (e.g Office 365, G Suite, Zoho Mail) that prevents other servers from sending email for your domain.
Example: include:yourserver.example.com
DKIM signing is a method of cryptographically ensuring that the mail server is authorized to send email. At the time of writing, Anti-Cloud Backup & Restore Server's built-in MTA does not support DKIM signing.
Anti-Cloud Backup & Restore Backup is responsible for closing-off a job log with Anti-Cloud Backup & Restore Server. If the PC is shut down unexpectedly, a job would be left in "Running" state indefinitely.
The old, inactive "Running" jobs will be cleaned up automatically if Anti-Cloud Backup & Restore sees an opportunity to prove that they are no longer running.
The following actions will clean up old, inactive "Running" jobs:
Note: If a backup job has before
or after
commands, then the Cancel
command may not appear to work. If the commands are stalled, then the cancellation request may have no apparent effect until the commands either finish, or are stopped. The commands are started by the backup.delegate
service, and as such, are not readily visible in a normally-logged-in user-view of Processes in the Windows Task manager. The processes may be found in the 'details' view, and can usually be stopped from there. Once stopped, the cancellation should work normally.
Anti-Cloud Backup & Restore Backup needs RAM to run. The main cause for this is to hold deduplication indexes; therefore the amount of RAM used is proportional to the size of the Storage Vault.
You might see these error messages:
runtime: VirtualAlloc of 1048576 bytes failed with errno=1455
0x5AF ERROR_COMMITMENT_LIMIT: The paging file is too small for this operation to complete.
fatal error: out of memory
Some trade-offs are possible, that can reduce Anti-Cloud Backup & Restore's memory usage at the expense of other system resource types:
This option causes Anti-Cloud Backup & Restore to read more data from the source disk, reading less data from the Storage Vault into in-memory indexes. This can have a varied impact on RAM usage, and may be positive or negative depending on the shape of your directories.
The "Prefer temporary files instead of RAM" option on a backup job schedule will cause Anti-Cloud Backup & Restore to keep indexes in an on-disk database file, instead of a pure in-memory index. The on-disk database file is mapped into pageable memory, that can more easily be reclaimed by the OS when the system is under memory pressure.
Depending on how you measure Anti-Cloud Backup & Restore's memory usage, this option may not immediately appear to have lower memory usage if your measurement includes mmap
disk sections. However, the resident working set is reduced.
There is a major performance penalty for using this option (approximately 5x or worse) and it is not generally recommended.
If you see an HTTP 500
error message in the Anti-Cloud Backup & Restore Backup logs, this means the server encountered an unspecified error.
If you see this while performing a backup, then you should contact Anti-Cloud Support with this message.
Anti-Cloud Backup & Restore detects the current device based on a hardware ID.
The hardware ID may be changed in some situations:
In these situations, the device's hardware ID will change, and Anti-Cloud Backup & Restore will recognise the PC as a new device.
If your device is recognised as a new device, you should register it again.
The original backup data is still preserved in the Storage Vault, and will be deduplicated against any future backups from this device.
You can move the Protected Item settings from one device to another, by using the Copy/Paste buttons in the Anti-Cloud Backup & Restore Server web interface on the user's page > Protected Items tab.
The old device should be revoked once the new device has been properly set up to prevent it from incurring a license charge, alternatively, removing all Protected Item's from the old device will also prevent the device from being charged.
The backup job log history will be preserved in the customer's account, but, it will be associated with the old device.
Once you de-register the original device, it would show as "Unknown device (XXXXX...)" in the job history.
The customer can still see these old jobs in the Anti-Cloud Backup & Restore Server web interface.
The customer can still see these old jobs in Anti-Cloud Backup & Restore Backup if they use the filter option > "All devices".
Because the device is detected as a new device, the billing period for this device will be restarted.
Lock files are an important part of Anti-Cloud Backup & Restore's safety design. Anti-Cloud Backup & Restore uses lock files to ensure data consistency during concurrent operations.
Anti-Cloud Backup & Restore Backup supports multiple devices backing up into a shared Storage Vault simultaneously. When Anti-Cloud Backup & Restore runs a retention pass to clean up data, it is important that no other backup jobs are running simultaneously.
A retention pass first looks at what data chunks exist in the Vault, then secondly deletes the unused ones.
A backup job first looks at what data chunks exist in the Vault, then secondly uploads new chunks from the local data, and uploads a backup snapshot that relies on both pre-existing and newly-uploaded chunks.
It is perfectly safe for multiple backup jobs to run simultaneously, even from multiple devices.
It is not safe for a retention pass to run at the same time as a backup job, because if the steps are interleaved (retention A > backup A > retention B > backup B) then a backup job might write a backup snapshot that refers to unknown chunks, resulting in data loss.
In order to check whether a retention pass is currently running, Anti-Cloud Backup & Restore must communicate between all devices that could potentially be using the Storage Vault.
In order to determine whether any other device is actively using a Storage Vault, Anti-Cloud Backup & Restore writes a temporary text file into the Storage Vault, and deletes it when the job is completed. This is the only mechanism supported across all Storage Vault types (i.e. local disk / SFTP / S3 / etc). Then, any other job can look for these files to see what other operations are taking place concurrently.
Jobs in a Storage Vault are classified into two categories:
Multiple non-exclusive jobs may run simultaneously from any device. A non-exclusive job will refuse to start if any exclusive jobs are currently running. An exclusive job will refuse to start if any other jobs are running.
Specifically:
If Anti-Cloud Backup & Restore is stopped suddenly (e.g. PC crash), the lock file would not be removed. All other Anti-Cloud Backup & Restore processes would not realize that the job had stopped. This could prevent proper functioning of backup jobs and/or retention passes.
Anti-Cloud Backup & Restore will alert you to this issue by failing the job. The error message should explain which device and/or job was responsible for originating the now-stale lock file.
You may see error messages of the form:
Locked by user '...' on this device (PID #...) since ... (... days ago)
Locked by user '...' on computer '...' (PID #...) since ... (... days ago)
However, the responsible process might have stopped.
If you investigate this process, and are absolutely certain it won't resume, then it's safe to ignore it and continue.
It is possible to delete lock files to recover from this situation. However, you MUST investigate the issue to ensure that the responsible process really has stopped. Consider that a PC may go to sleep at any time, and wake up days or weeks later, and immediately resume from the middle of a backup or retention operation; if the lock files were removed incorrectly, data loss is highly likely.
If you are sure that the responsible process is stopped, you can delete the lock files.
You can initiate this in Anti-Cloud Backup & Restore Backup, on the "Account" pane > right-click Storage Vault > "Advanced" > "Clean up lock files" option
Anti-Cloud Backup & Restore Backup will automatically delete stale lock files when it determines that it is safe to do so.
If you encounter a Packindex '...' for snapshot '...' refers to unknown pack '...', shouldn't happen
error, a data file has been erroneously deleted inside the Storage Vault. Data has been lost. This can happen if the "Unlock" feature is used without proper caution as advised above.
The message indicates that X number of index files refer(s) to data chunks that cannot currently be found inside the Storage Vault.
Encrypted data chunks in the Storage Vaults are carefully curated and indexed. It is still possible for the index of data chunks to become mismatched with the actual chunks stored. This can happen:
The message is similar to the 'Reindex needed' issue. It indicates that a specific backup snapshot, 'ssssssss', refers to data chunks, 'dddddddd', that cannot currently be found inside the Storage Vault. The specified backup snapshot is not currently restorable.
The error message may show more than one snapshot.
The index of encrypted data chunks in the Storage Vaults is carefully curated. It is still possible for the index of data chunks to become mismatched with the actual chunks stored. This can happen:
We need to remove the packindex 'pppppppp' from the Storage Vault, then run a Retention Pass into the Vault to recalculate and regenerate the packindex.
Steps:
Note: We recommend that you delete only the packindex files indicated by the error log. You could delete all packindex files, but, whilst technically a safe operation, the regeneration time for the files may be very long, especially for large data sizes.
An absence of log errors indicates the optimization pass found the missing data chunk(s) somewhere in the Storage Vault, and created a new index to reference it. The issue is solved.
If the optimization pass does NOT find the missing data chunk(s), then snapshot will never be recoverable, and we must remove it from the list of available snapshots. The following steps detail this procedure.
CAUTION: A deletion cannot be undone! Ensure you have followed all instructions above before proceeding!
The first step on accessing a new, uninitalised Storage Vault is to generate and store some encryption material.
If a backup to a new Storage Vault seems to hang at this initial step, it's likely that Anti-Cloud Backup & Restore Backup is failing to access the storage location, and repeatedly retrying- and timing-out. An error message may appear after some extended duration.
Some possible causes of this issue are
127.0.0.1
OneDrive, Google Drive, and similar cloud document editors/storage all operate alike in that user files are stored as on-demand files in the respective cloud server repositories. These locations which are not easily accessible by Anti-Cloud Backup & Restore, regardless of whether a device can view and access them. Backing up these files is ONLY possible if you make a local copy of these files available to the Anti-Cloud Backup & Restore client software. This may have unwanted consequences on network loading and local disk space.
To save on disk space, OneDrive (and some other cloud storage providers) use a system where some files are only "virtually" stored on the local disk, and are materialized from the cloud storage on-demand.
When you use the "Take filesystem snapshot" option in Anti-Cloud Backup & Restore, Anti-Cloud Backup & Restore takes a VSS snapshot of the disk. This is a read-only snapshot.
When you back up the OneDrive directory with VSS enabled, OneDrive is not able to download files into the snapshot, because the snapshot is read-only. This causes the "Media is write protected" error message.
In this situation, your OneDrive data is not being protected by Anti-Cloud Backup & Restore and is not available for restore.
You can workaround this issue by creating two Protected Items: one with VSS enabled, that excludes the OneDrive directory; and a second one with VSS disabled, that only includes the OneDrive directory.
Note that if OneDrive needs to materialize a lot of data from the cloud, then backing up the OneDrive directory may cause a lot of data to be downloaded.
If you encounter the "Access to the cloud file is denied" error message, this means that file in question does not exist on the local PC, and the OneDrive virtual filesystem driver is refusing to download this file on-demand for Anti-Cloud Backup & Restore to read it.
At the time of writing, the only available workaround is to disable the "Files-On-Demand" feature in OneDrive. However, this may cause an unacceptable increase in local disk usage for some customers.
To disable the "Files-On-Demand" feature in OneDrive:
The Google File Stream app creates a virtual drive, e.g. G:\, that streams-in data from a business Google Drive account, over the internet, on-demand, without using any local disk storage, other than a small cache.
The virtual drive only exists for the interactive logged-in user session.
Anti-Cloud Backup & Restore Backup runs all backups (both interactive and scheduled backups) using a service user account. Different logon sessions have their own set of mapped drive letters, and the service session simply does not see that the virtual drive, G:\, exists.
It's still visible in the Anti-Cloud Backup & Restore Backup GUI file picker, which runs as the interactive logged-on user for performance reasons.
Ideally it would be possible to mount the virtual G:\ drive "For all users", to resolve this issue.
Currently, this does not appear to be possible in File Stream: https://productforums.google.com/forum/#!topic/apps/iRH9lD9NM90
Note: If the virtual G:\ drive can be made available to all users, the process of backing up this data requires that it be downloaded first from the Google Drive, and this may cause large amounts of inbound network traffic.
There are third-party programs for mounting Google Drive as a drive letter that may support "All Users". StableBit Cloud Drive (commercial) may do this, as well as 'rclone mount'.
You may see a warning of this form in the backup job logs:
EFS-encrypted files may be unusable once restored, unless you also backup the EFS encryption keys from this PC.
To disable this warning, please ensure you have backed up the EFS encryption keys, and then tick the 'Dismiss the EFS warning' option in the Protected Item settings.
EFS is a Windows feature that allows you to encrypt individual files on disk. The backup job was successful, but if you restore the data to a new PC, the files might not be readable because the EFS encryption keys are tied to the Windows user account. In effect, the backup might not be restorable in a practical sense.
For more information, please see the full article on EFS in the "Protected Items" section,
Error "The target path 'X:\WindowsImageBackup' already exists - please safely remove this directory and retry the backup."
The "Windows System Backup" Protected Item type uses the wbadmin
program to write a disk image to the spool directory; backs up the spool directory with Anti-Cloud Backup & Restore; and then cleans up the spool directory. Anti-Cloud Backup & Restore automatically removes this directory after the backup, even if the backup failed.
If the directory exists at the start of a backup job, this could mean either
wbadmin
functionality for System State or Windows System Backup.You can avoid case 2 above by using the "Skip if already running" option.
It's not generally possible to distinguish between case 1 and case 3 above. If you look at the job history or the customer's PC, and you are able to make a positive distinction between these cases, it may be safe to delete the directory.
You can temporarily add the following command as a "Before" command to the backup job:
rmdir /S /Q "X:\WindowsImageBackup\"
You should then remove this command from the job settings after the command has run, because this command would cause problems if two Anti-Cloud Backup & Restore backup jobs ever run simultaneously in the future.
Error "An attempt was made to access a socket in a way forbidden by its access permissions" in Anti-Cloud Backup & Restore Server
This error message occurs when configuring Anti-Cloud Backup & Restore Server on Windows to listen on an IP/port combination that is either (A) forbidden by the firewall, or (B) in-use by another application. Usually this affects port 80
or 443
.
The following troubleshooting guidance is available:
One possibility is that the system firewall is preventing Anti-Cloud Backup & Restore Server from binding to this IP/Port. Anti-Cloud Backup & Restore Server automatically makes a firewall exception for itself in Windows Firewall.
Is there any website visible when you browse to the IP/port in a web browser?
Is IIS installed?
If you open Command Prompt as Administrator and run netstat -o
, it shoudl list all the open network connections.
:80
), and compare the PID in Task Manager to find the process?If the affected process is "SYSTEM" (PID 4), then the http.sys
driver is responsible for binding the port. The network system from IIS (http.sys
) is also a necessary component of some other Windows features and may have been installed automatically.
You can run net stop http
to stop the driver and all the services that are using it.
Some common services that use this driver are
MsDepSvc
service)WS-Management
service)If you discover the services are essential, you could work around this issue by
A file handle is an abstract concept that includes network connections, temporary files, and disk files.
If you experience the too many open files
error message, this means Anti-Cloud Backup & Restore is either
During a backup job, Anti-Cloud Backup & Restore uses approximately
You may be able to work around this issue by
If you discover your device has a different limit than the Operating System default, you should find the configuration file where the limit has been altered.
Each process has a limit on the total number of open handle objects. The maximum number of open handles is 16711680 (16 million) on x86_64
versions of Windows. However, it may be lower on other CPU architectures, or it might lowered by a system administrator via Group Policy.
There is also a per-session limit on the number of opened files over the network. The default value is 16384; you can see this by running: net config server
.
You can see the current per-process handle count from Task Manager, on the Details tab by enabling the optional column "Handles".
Anti-Cloud Backup & Restore tried to access the Storage Vault, but it contained data using an unknown encryption key. Probably this Storage Vault is using the same data location as another Storage Vault (from the same- or a different- user account).
Each Storage Vault in a user's profile is automatically encrypted on first use, with a randomly generated key. If you reuse the data storage location that was already used by another user's Storage Vault, Anti-Cloud Backup & Restore would not know the encryption key for the Storage Vault, and would be unable to access it.
If you intended to share the same Storage Vault between multiple users, you should log their devices into the same account. Otherwise, you should use a different physical location for each Storage Vault.
Error "A specified logon session does not exist. It may already have been terminated" when accessing a Windows network share (SMB)
Some SMB servers don't seem to accept multiple SMB login sessions, if they use the same SMB credentials from the same host from different Windows user accounts.
On Windows, each user session has its own set of network login sessions. Anti-Cloud Backup & Restore performs the backup using a service user account. Therefore, this issue could occur with an affected SMB server if the interactive Windows user was logged in to the network share simultaneously.
If you are experiencing this issue, please contact support so that we can document any affected OSes and versions.
This issue is known to affect some Synology NAS devices.
The "Run as Administrator" session also has its own separate network login sessions.
The interactive user account may have an open network session to the affected device.
From a command prompt, can you run net use
to see if the interactive user is logged in to the network share?
From a command prompt, if you run net use \\server_name\share_name /DELETE
to log the interactive user out of the network share, does this allow the backup to proceed?
If you are backing up from the SMB server, you could work around this issue by logging the interactive user account out of Windows entirely before the job starts. This will close their network sessions. Anti-Cloud Backup & Restore will successfully log in to the network share; you should add net use /DELETE
as an After command in Anti-Cloud Backup & Restore to ensure the service user logs out again after the backup
Alternatively, by
net use /DELETE
in Task Scheduler before the backup window, to log the interactive user outnet use /DELETE
as an After command in Anti-Cloud Backup & Restore, so the service user logs outnet use
in Task Scheduler after the backup window, to log the interactive user back in againIf you are backing up to the SMB server, you could work around this issue by
Error "The term Get-VM is not recognized" or "Please install 'Hyper-V Module for Windows PowerShell'" in Hyper-V backups
The Hyper-V Module for Windows PowerShell
must be installed to use this feature. You can install this module from PowerShell or from Windows Server Manager.
You can install the module from PowerShell by running Install-WindowsFeature -Name Hyper-V-PowerShell
.
You can install the module from Windows Server Manager, in "Add Roles and Features", in "Features".
For Windows Server 2016, the feature checkbox is located under "Remote Server Administration Tools" > "Role Administration Tools" > "Hyper-V Management Tools" > "Hyper-V Module for Windows PowerShell".
Windows was unable to launch Anti-Cloud Backup & Restore's process because of an internal error.
In our experience, this issue can be resolved by running Windows Update. Please ensure Windows Update is fully up-to-date on this PC.
If this does not resolve the issue, please contact support for further assistance,
Anti-Cloud Backup & Restore tells machines apart by their "device ID". This is automatically determined from a mix of hardware and software identifiers.
One possible cause of this issue is if the two VMs were originally clones of each other. If you have cloned a VM in the past, it might have the same hardware and software identifiers, and so appear to Anti-Cloud Backup & Restore as the same device.
If multiple devices appear to Anti-Cloud Backup & Restore as the same device, they will share the same Protected Items and job scheduling. This causes follow-on issues for logging and reporting.
You can resolve this issue by changing the hardware or software ID for the affected VM. This will influence Anti-Cloud Backup & Restore's device ID to force the devices to be detected as different devices.
On Windows, you can add extra data to influence the generated device ID by creating a registry key.
regedit.exe
)HKEY_LOCAL_MACHINE\Software\backup-tool
folder key, creating it if it does not already exist
DeviceIdentificationEntropy
backup.delegate
and backup.elevator
)Anti-Cloud Backup & Restore does not expand Windows environment variables in the path selection.
The Anti-Cloud Backup & Restore Backup app runs backup jobs as a dedicated service account. If the %userprofile%
environment variable was expanded, it would refer to the "wrong" user account.
You can back up the %USERPROFILE%\Documents
directory for all users, by
C:\Users
directory, andC:\Users\**\Downloads
or regex ^C:\\Users\\[^\\+]\\Downloads
).This error message can occur either immediately, when running any backup or restore operation; or, it can occur part-way through a job.
If this error message occurs immediately, it means Anti-Cloud Backup & Restore was unable to connect to the Storage Vault at all, because the encryption key in the user's Storage Vault settings does not match the files in the /keys/
subdirectory in the data storage location.
When a Storage Vault is used for the first time, Anti-Cloud Backup & Restore generates a random encryption key, and stores it in an encrypted form in both (A) the user's profile, and (B) in the /keys/
subdirectory in the data storage location. It's important that these match at all times. If they do not match, Anti-Cloud Backup & Restore will be unable to use the data inside the Storage Vault.
You may potentially encounter this issue in the following situations:
If the first time this Storage Vault was used, multiple backup jobs ran simultaneously
If you were performing a Seed Load, but...
/keys/
subdirectory or the top-level config
file; orIf you change the Storage Vault location to point to another user account's Storage Vault
This indicates that a file inside the Storage Vault is corrupted. Please run a "Deep Verify" action on the Storage Vault, and see the "Data validation" section in the Appendix for more information.
The "Windows Server System State" and "Windows System Backup" Protected Item types in Anti-Cloud Backup & Restore inherit some restrictions from the underlying technology (wbadmin
).
It's not officially possible to spool the backup job to a USB flash drive. This is a preventative measure in case the drive is removed mid-backup.
The following workarounds are available:
For more information, please see https://social.technet.microsoft.com/Forums/windowsserver/en-US/c39c050f-d579-4222-8ad1-44d2ff53882b/windows-backup-cannot-see-usb-flash-drive?forum=windowsbackup#03e336a4-bc68-46f6-9a4c-be6907903da6
For more information, please see https://social.technet.microsoft.com/Forums/lync/en-US/e1f0fa4e-5fb0-4749-82d6-16b1bd427495/when-will-windows-server-backup-allow-usb-flash-drives-as-a-target?forum=windowsbackup#fc8affd9-378a-447e-a36e-c5af0bb1e40b
This error may affect Anti-Cloud Backup & Restore Backup or Anti-Cloud Backup & Restore Server. Both products make use of a background Windows service.
Please check in Windows Event Viewer for more detail about the error message. There may be an error report in the "System" log category, from the "Service Control Manager" source.
One possible reason is that an account password was specified incorrectly.
Another possible reason for this issue is if the right to log on as a service is denied for this user account. Normally the Anti-Cloud Backup & Restore installer asserts this policy during installation; however, on a domain-joined machine, it might have been overwritten by Active Directory policy.
gpedit.msc
; on the left-hand tree, expand "Computer Configuration" > "Windows Settings" > "Security Settings" > "Local Policies" > "User Rights Assignment"; then open the "Log on as a service" item. The target user should appear in this list, or, the target user should be a member of a Windows group that appears in this list.There are many possible reasons why a backup job might be slow.
Did the issue suddenly start happening, on a certain time?
Are multiple customers experiencing the issue, or just a single customer? This helps determine whether the issue is related to your general/server-side infrastructure or whether the issue is related to the customer's environment.
Antivirus
backup-tool.exe
program in the antivirus software?
Use of slow settings
RAM usage
CPU usage
Check what kind of disks the customer is backing up.
Check what kind of storage the customer is using.
Check where the temporary directory is for the backup service user account.
Avoid backing up files from a network share
Backup storage on the same volume as the backup source
Backup source is a single-queue block device
Use of external harddrives
Backing up direct to cloud storage
Backing up to Anti-Cloud Backup & Restore Server Storage Role bucket
The latest 1.3 version of TLS reduces connection latency and improves connection security. Anti-Cloud Backup & Restore Server continues to support genuine TLS 1.2 connections.
If you see the ERR_SSL_VERSION_INTERFERENCE
error, this message means that your web browser and the web server tried to use the latest TLS 1.3 standard, but, something inbetween them does not support TLS 1.3. Your web browser chose to abandon the connection rather than downgrading the connection security to TLS 1.2.
If there are middleboxes or software on the network path, that expect to be able to intercept SSL traffic but do not support TLS 1.3, then all TLS 1.3 connections will fail. These middleboxes or software on the network path may need a software update to support TLS 1.3.
Are you using any "web security" software that intercepts SSL certificates? (e.g. ESET Internet Security, Symantec Web Security Service)
Are you behind a corporate or education network proxy that intercepts SSL certificates? (e.g. BlueCoat / Microsoft Forefront TMG)
Is the web browser up-to-date? Some web browsers use an early draft of the TLS 1.3 standard that might be incompatible with the final TLS 1.3 used by Anti-Cloud Backup & Restore Server
A last-resort is to disable TLS 1.3 in your web browser, so that the web browser connects with TLS 1.2.
This error message indicates the application tried to do something not supported by the disk, but all Anti-Cloud Backup & Restore is doing is reading those files and directories. If this error happens for a normal local disk, then that is certainly supported functionality.
One possibility is that the disk driver is reporting this error message as a symptom of disk corruption when it fails to read sectors for those files.
Error "The specified backup storage location has the shadow copy storage on another volume" using Windows System Backup
This error is not specific to Anti-Cloud Backup & Restore. You may find more information online.
There is a problem with using the selected spool directory. The spool drive has its shadow storage configured in an unusual way that is incompatible with the wbadmin
tool.
What kind of drive is the spool target? Is it a network share, or an external harddrive, or a SAN? If it is a SAN, is it a managed appliance?
What is the output of running this command as Administrator: vssadmin list shadowstorage
You may be able to workaround this issue by creating a network share on the same drive, and entering the UNC path to the share instead of the actual local drive letter.
Depending on the state of the last Exchange Server backup job, you may need to merge log files into the EDB file before it can be accessed. You can do this with the eseutil
program included in Exchange Server.
For example, if the database was restored to D:\restore-edb
:
eseutil /MH "D:\restore-edb\File\Mailbox.edb"
eseutil /R E00 /D "D:\restore-edb\File" /D "D:\restore-edb\Logs" /S "D:\restore-edb\Logs"
For more information, see this Microsoft article.
Anti-Cloud Backup & Restore Backup tried to read a file from the disk for backup, but Windows was unable to provide the file content.
This specific error message comes from the disk driver. If the local disk is a HDD or SSD, the most common cause is a bad sector in the physical hardware: please use the chkdsk
tool to schedule a boot-time sector check.
The buckets in the Anti-Cloud Backup & Restore Server storage role all have an ID and a key which must match inside the customer's Storage Vault settings.
These are just login fields, and are not tied to the underlying data encryption.
This explains why you can use the "seed load" process to switch a Storage Vault to point to a different location. The access key is just about accessing the location, not about what's inside it.
Steps to re-key:
This is just like seed loading, but, between two buckets on the same server
The vault is temporarily locked by device 'XXXXXXXX', while that device finishes its backup and runs its retention pass.
The log file may show something like: Locked by device '[deviceID]' (PID #[XXXX]) since [timestamp] (400hrs59m59s ago)
The final automatic phase of the backup process is for the device performing the backup to temporarily 'lock' the Storage Vault for a few minutes so that it can delete old snapshots, unreferenced data, etc, per the retention policy.
While the vault is locked, other devices cannot start writing to the vault. This lock ensures that data which is in the process of being added, but not yet fully-referenced in the index, is not deleted. As long as the Storage Vault is not under continuous use with over-lapping backup jobs, one backup job will eventually 'finish last', and will run the retention pass.
If the device goes offline during this final phase (power-cut, sudden sleep mode, network connection lost, etc), then the final phase may not be completed. The 'lock' will stay in place, and the vault will remain in a not-writeable state.
You can find which device is locking the vault via: Accounts -> Users -> name -> Devices tab -> View -> tick to enable 'Device ID'. Look in to the profile of a user whose device(s) backup to the same vault.
The device which has locked the vault is the one whose ID starts with "XXXXXXXX...".
NOTE: If you cannot find the device, it has been revoked, and will not now show up in the current device list. You SHOULD ensure that all running jobs for that device have been successfully cancelled, then proceed to the Unlocking the Vault section below.
If the job has been running for an unusually long or extended period (as in the above example: '400hrs'), then it may be that the device has been shut-down unexpectedly before a stop signal could be acknowledged by either the Anti-Cloud Backup & Restore server or the device.
If the job has been running for less than 5 minutes, you SHOULD let it complete by itself.
BEST OPTION IN ALL CIRCUMSTANCES - You SHOULD find the device and 'wake it up', switch it on, or whatever is needed to bring it back 'Online'. If it can not be brought back online, the next best thing is to verify that the device has been lost, stolen, or permanently revoked.
This is a VSS snapshot error. It indicates that the VSS snapshot may have been destroyed while the backup was in progress. VSS snapshots can be destroyed manually by malware, or by 'cleanup' type programs. They can also be destroyed if the device is low on disc space, and the device uses space in the 'shadow' area where the snapshot is being put together.
The error messages appears similar to: "Open failed because: open \?\GLOBALROOT\Device\HarddiskVolumeShadowCopy16\FOLDER\FOLDER\FILE: A device which does not exist was specified", and "Error for \?\GLOBALROOT\Device\FOLDER\FOLDER\FILE: BackupRead \?\GLOBALROOT\Device\FOLDER\FOLDER\FILE: The device is not ready".
Cause: This error is a result of the client background service not having permission to take a VSS snapshot.
The Anti-Cloud Backup & Restore client-installer explicitly grants permission to take VSS snapshots.
Check the Anti-Cloud Backup & Restore service user account in services.msc. It should be running as the 'NT SERIVCE\backup.delegate' account. This may have been removed by a group policy.
If the device is an Active Directory domain-joined machine, then the AD controller may be enforcing a set of permissions which over-ride the ones that the Anti-Cloud Backup & Restore installer has created.
Solution: None directly through Anti-Cloud Backup & Restore, as an external action has changed the permissions.
Work-around: Reinstall the client software to ensure that the client has the correct permissions. Monitor the logs for the same error message - this will point to the time-range in which the permissions changed, and enable a remedy to be constructed and applied.
A cautionary note:
Problem: Windows client does not show at all on user profile Devices tab
Causes:
curl -v -X POST --data-urlencode "Username=<username>" --data-urlencode "AuthType=Password" --data-urlencode "Password=<password>" <yourURL>/api/v1/user/web/session/start
**Note: Requires Windows 1809 onwards, or that you install Curl: https://curl.haxx.se/windows/
{"SessionKey":"abc1fd20-7177-12362-88ba-863efgfe07b0","SessionType":"user","Status":200,"Message":"Logged in OK."} Connection #0 to host <yourURL> left intact
Partition unused error (shouldn't happen)
When PC Starts, if last job was Missed
may not get triggered.When PC Starts, if last job was Missed
option won't currently trigger where there is not a startup. Timezone
is selected correctly.