Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
4Activity

Table Of Contents

1.1 Acronis Backup & Recovery 10 overview
1.2 Getting started
1.2.1 Using the management console
1.3 Acronis Backup & Recovery 10 components
1.3.1 Agent for Windows
1.3.2 Components for centralized management
1.3.3 Management Console
1.3.4 Bootable Media Builder
1.3.5 Acronis WOL Proxy
1.4 Supported file systems
1.5 Supported operating systems
2 Understanding Acronis Backup & Recovery 10
2.2 Full, incremental and differential backups
2.3 User privileges on a managed machine
2.4 Owners and credentials
2.5 GFS backup scheme
2.7 Retention rules
2.8 Backing up dynamic volumes (Windows)
2.9 Tape support
2.9.1 Tape compatibility table
2.9.2 Using a single tape drive
2.10 Proprietary Acronis technologies
2.10.1 Acronis Secure Zone
2.10.2 Acronis Startup Recovery Manager
2.10.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore)
2.10.4 Acronis Active Restore
2.11 Understanding centralized management
2.11.1 Basic concepts
2.11.2 Setting up centralized data protection in a heterogeneous network
2.11.3 Grouping the registered machines
2.11.4 Policies on machines and groups
2.11.5 Backup policy's state and statuses
2.11.6 Deduplication
2.11.7 Privileges for centralized management
2.11.8 Communication between Acronis Backup & Recovery 10 components
3 Options
3.1 Console options
3.1.1 Startup page
3.1.2 Pop-up messages
3.1.3 Time-based alerts
3.1.4 Number of tasks
3.1.5 Fonts
3.2 Management server options
3.2.1 Logging level
3.2.2 Log cleanup rules
3.2.3 Event tracing
3.2.4 Domain access credentials
3.2.5 Acronis WOL Proxy
3.2.6 VM protection options
3.3 Machine options
3.3.1 Machine management
3.3.2 Event tracing
3.3.3 Log cleanup rules
3.3.4 Customer Experience Program
3.4 Default backup and recovery options
3.4.1 Default backup options
3.4.2 Default recovery options
4 Vaults
4.1 Centralized vaults
4.1.1 Working with the "Centralized vault" view
4.1.2 Actions on centralized vaults
4.1.3 Tape libraries
4.2 Personal vaults
4.2.1 Working with the "Personal vault" view
4.2.2 Actions on personal vaults
4.3 Common operations
4.3.1 Operations with archives stored in a vault
4.3.2 Operations with backups
4.3.3 Deleting archives and backups
4.3.4 Filtering and sorting archives
5 Scheduling
5.1 Daily schedule
5.2 Weekly schedule
5.3 Monthly schedule
5.4 Advanced scheduling settings
5.5 At Windows Event Log event
5.6 Conditions
5.6.1 User is idle
5.6.2 Location's host is available
5.6.3 Fits time interval
5.6.4 User logged off
5.6.5 Time since last backup
6 Direct management
6.1 Administering a managed machine
6.1.1 Dashboard
6.1.2 Backup plans and tasks
6.1.3 Log
6.2 Creating a backup plan
6.2.1 Why is the program asking for the password?
6.2.2 Backup plan's credentials
6.2.3 Source type
6.2.4 Items to back up
6.2.5 Access credentials for source
6.2.6 Exclusions
6.2.7 Archive
6.2.8 Access credentials for archive location
6.2.9 Backup schemes
6.2.10 Archive validation
6.2.11 Setting up regular conversion to a virtual machine
6.3 Recovering data
6.3.1 Task credentials
6.3.2 Archive selection
6.3.3 Data type
6.3.4 Content selection
6.3.5 Access credentials for location
6.3.6 Destination selection
6.3.7 Access credentials for destination
6.3.8 When to recover
6.3.9 Universal Restore
6.3.10 How to convert a disk backup to a virtual machine
To convert a disk backup to a virtual machine:
6.3.11 Bootability troubleshooting
6.3.12 Recovering the storage node
6.4 Validating vaults, archives and backups
6.4.1 Task credentials
6.4.2 Archive selection
6.4.3 Backup selection
6.4.4 Location selection
6.4.5 Access credentials for source
6.4.6 When to validate
6.5 Mounting an image
6.5.1 Archive selection
6.5.2 Backup selection
6.5.3 Access credentials
6.5.4 Volume selection
6.6 Managing mounted images
6.7 Exporting archives and backups
6.7.1 Task credentials
6.7.2 Archive selection
6.7.3 Backup selection
6.7.4 Access credentials for source
6.7.5 Location selection
6.7.6 Access credentials for destination
6.8 Acronis Secure Zone
6.8.1 Creating Acronis Secure Zone
6.8.2 Managing Acronis Secure Zone
6.9 Acronis Startup Recovery Manager
6.10 Bootable media
6.10.1 How to create bootable media
6.10.2 Connecting to a machine booted from media
6.10.3 Working under bootable media
6.10.4 List of commands and utilities available in Linux-based bootable media
6.10.5 Recovering MD devices and logical volumes
6.10.6 Acronis PXE Server
6.11 Disk management
6.11.1 Basic precautions
6.11.2 Running Acronis Disk Director Lite
6.11.3 Choosing the operating system for disk management
6.11.4 "Disk management" view
6.11.5 Disk operations
6.11.6 Volume operations
6.11.7 Pending operations
6.12 Collecting system information
7 Centralized management
7.1 Administering Acronis Backup & Recovery 10 Management Server
7.1.1 Dashboard
7.1.2 Backup policies
7.1.3 Physical machines
7.1.4 Virtual machines
7.1.5 Storage nodes
7.1.6 Tasks
7.1.7 Log
7.1.8 Reporting
7.2 Configuring Acronis Backup & Recovery 10 components
7.2.1 Parameters set through administrative template
7.2.2 Parameters set through GUI
7.2.3 Parameters set through Windows registry
7.3 Creating a backup policy
7.3.1 Policy credentials
7.3.2 Items to back up
7.3.3 Access credentials for source
7.3.4 Exclusions
7.3.5 Archive
7.3.6 Access credentials for location
7.3.7 Backup scheme selection
7.3.8 Archive validation
Glossary A
0 of .
Results for:
No results containing your search query
P. 1
Acronis Backup & Recovery 10 User Guide

Acronis Backup & Recovery 10 User Guide

Ratings: (0)|Views: 506 |Likes:
Published by drcrader

More info:

Published by: drcrader on Sep 05, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/26/2011

pdf

text

original

You're Reading a Free Preview
Pages 8 to 31 are not shown in this preview.
You're Reading a Free Preview
Pages 39 to 277 are not shown in this preview.
You're Reading a Free Preview
Pages 289 to 347 are not shown in this preview.
You're Reading a Free Preview
Pages 355 to 369 are not shown in this preview.

Activity (4)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
mahmoud.nouh liked this
Acharya liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->