Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

1.1 Acronis Backup & Recovery 10 overview
1.2 Getting started
1.3 Acronis Backup & Recovery 10 components
1.3.1 Agent for Windows
1.3.2 Agent for Linux
1.3.3 Components for centralized management
1.3.4 Management Console
1.3.5 Bootable Media Builder
1.3.6 Acronis Wake-On-LAN Proxy
1.4 Supported file systems
1.5 Supported operating systems
2 Understanding Acronis Backup & Recovery 10
2.2 User privileges on a managed machine
2.3 Owners and credentials
2.4 Full, incremental and differential backups
2.5 GFS backup scheme
2.6 Tower of Hanoi backup scheme
2.7 Retention rules
2.8 Backing up dynamic volumes (Windows)
2.9 Backing up LVM volumes and MD devices (Linux)
2.9.1 Backing up logical volumes
2.9.2 Backing up MD devices
2.9.3 Saving the volume structure information
2.9.4 Selecting logical volumes and MD devices in command line
2.10 Backing up hardware RAID arrays (Linux)
2.11 Tape support
2.11.1 Tape compatibility table
2.11.2 Using a single tape drive
2.12 Support for SNMP
2.13 Proprietary Acronis technologies
2.13.1 Acronis Secure Zone
2.13.2 Acronis Startup Recovery Manager
2.13.3 Universal Restore (Acronis Backup & Recovery 10 Universal Restore)
Acronis Backup & Recovery 10 Universal Restore purpose
2.13.4 Acronis Active Restore
2.14 Understanding centralized management
2.14.1 Basic concepts
2.14.2 Setting up centralized data protection in a heterogeneous network
2.14.3 Grouping the registered machines
2.14.4 Policies on machines and groups
2.14.5 Backup policy's state and statuses
2.14.6 Deduplication
2.14.7 Privileges for centralized management
2.14.8 Communication between Acronis Backup & Recovery 10 components
3 Options
3.1 Console options
3.1.1 Startup page
3.1.2 Pop-up messages
3.1.3 Time-based alerts
3.1.4 Number of tasks
3.1.5 Fonts
3.2 Management server options
3.2.1 Logging level
3.2.2 Log cleanup rules
3.2.3 Event tracing
3.2.4 Domain access credentials
3.2.5 Acronis WOL Proxy
3.2.6 VM protection options
3.2.7 Online backup proxy
3.3 Machine options
3.3.1 Machine management
3.3.2 Event tracing
3.3.3 Log cleanup rules
3.3.4 Online backup proxy
3.3.5 Customer Experience Program
3.4 Default backup and recovery options
3.4.1 Default backup options
3.4.2 Default recovery options
4 Vaults
4.1 Centralized vaults
4.1.1 Working with the "Centralized vault" view
4.1.2 Actions on centralized vaults
4.1.3 Tape libraries
4.2 Personal vaults
4.2.1 Working with the "Personal vault" view
4.2.2 Actions on personal vaults
4.3 Common operations
4.3.1 Operations with archives stored in a vault
4.3.2 Operations with backups
4.3.3 Deleting archives and backups
4.3.4 Filtering and sorting archives
5 Scheduling
5.1 Daily schedule
5.5 Advanced scheduling settings
5.6 When an ADRM alert is received
5.7 Conditions
5.7.1 User is idle
5.7.2 Location's host is available
5.7.3 Fits time interval
5.7.4 User logged off
5.7.5 Time since last backup
6 Direct management
6.1 Administering a managed machine
6.1.1 Dashboard
6.1.2 Backup plans and tasks
6.1.3 Log
6.2 Creating a backup plan
6.2.1 Why is the program asking for the password?
6.2.2 Backup plan's credentials
6.2.3 Source type
6.2.4 Items to back up
6.2.5 Access credentials for source
6.2.6 Exclusions
6.2.7 Archive
6.2.8 Simplified naming of backup files
6.2.9 Access credentials for archive location
6.2.10 Backup schemes
6.2.11 Archive validation
6.2.12 Setting up regular conversion to a virtual machine
6.3 Recovering data
6.3.1 Task credentials
6.3.2 Archive selection
6.3.6 Destination selection
6.3.7 Access credentials for destination
6.3.8 When to recover
6.3.9 Universal Restore
6.3.10 How to convert a disk backup to a virtual machine
To convert a disk backup to a virtual machine:
6.3.11 Bootability troubleshooting
6.3.12 Assembling MD devices for recovery (Linux)
6.5.3 Access credentials
6.5.4 Volume selection
6.6 Managing mounted images
6.7 Exporting archives and backups
6.7.1 Task credentials
6.7.2 Archive selection
6.7.3 Backup selection
6.7.4 Access credentials for source
6.7.5 Location selection
6.7.6 Access credentials for destination
6.8 Acronis Secure Zone
6.8.1 Creating Acronis Secure Zone
6.8.2 Managing Acronis Secure Zone
6.9 Acronis Startup Recovery Manager
6.10 Bootable media
6.10.1 How to create bootable media
6.10.2 Connecting to a machine booted from media
6.10.3 Working under bootable media
6.10.4 List of commands and utilities available in Linux-based bootable media
6.10.5 Recovering MD devices and logical volumes
6.10.6 Acronis PXE Server
6.11 Disk management
6.11.1 Basic precautions
6.11.2 Running Acronis Disk Director Lite
6.11.3 Choosing the operating system for disk management
6.11.4 "Disk management" view
6.11.5 Disk operations
6.11.6 Volume operations
6.11.7 Pending operations
6.12 Collecting system information
7 Centralized management
7.1 Administering Acronis Backup & Recovery 10 Management Server
7.1.1 Dashboard
7.1.2 Backup policies
7.1.3 Physical machines
7.1.4 Virtual machines
7.1.5 Storage nodes
7.1.6 Tasks
7.1.7 Log
7.1.8 Reporting
7.2 Configuring Acronis Backup & Recovery 10 components
7.2.1 Parameters set through administrative template
7.2.2 Parameters set through GUI
7.2.3 Parameters set through Windows registry
7.3 Creating a backup policy
7.3.1 Policy credentials
7.3.2 Items to back up
7.3.3 Access credentials for source
7.3.4 Exclusions
7.3.7 Backup scheme selection
7.3.8 Archive validation
8 Online backup
8.1 Introduction to Acronis Backup & Recovery 10 Online
8.1.1 What is Acronis Backup & Recovery 10 Online?
8.1.2 What data can I back up and recover?
8.1.3 How long will my backups be kept in the online storage?
8.1.4 How to secure my data?
8.1.5 How to back up virtual machines to the online storage?
8.1.6 Backup and recovery FAQ
8.1.7 Initial Seeding FAQ
8.1.8 Large Scale Recovery FAQ
8.1.9 Subscription lifecycle FAQ
8.2 Where do I start?
8.3 Choosing a subscription
8.4 Activating online backup subscriptions
8.4.1 Activating subscriptions
8.4.2 Reassigning an activated subscription
8.5 Configuring proxy settings
8.6 Limitations of the online storage
8.7 Terminology reference
9 Glossary A
0 of .
Results for:
No results containing your search query
P. 1
ABR10AS Userguide en-US

ABR10AS Userguide en-US

Ratings: (0)|Views: 57|Likes:
Published by Mohamed Rufaik

More info:

Published by: Mohamed Rufaik on Nov 13, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/13/2011

pdf

text

original

You're Reading a Free Preview
Pages 9 to 170 are not shown in this preview.
You're Reading a Free Preview
Pages 179 to 226 are not shown in this preview.
You're Reading a Free Preview
Pages 235 to 242 are not shown in this preview.
You're Reading a Free Preview
Pages 251 to 365 are not shown in this preview.
You're Reading a Free Preview
Pages 374 to 412 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->