Operation Manual

360 Copyright © Acronis International GmbH, 2002-2015
The software generates a common name for the new archives and displays it in the Name field. The
name looks like [Machine Name]_Archive(N), where the [Machine Name] stands for the machine's
name (physical or virtual), and N is a sequence number. If you are not satisfied with the automatically
generated name, construct another name.
When selecting data to back up from multiple machines, the following variables can be used:
[Machine Name] - substitution for the machine's name. Use of this variable is mandatory.
[Plan name] - substitution for the centralized backup plan's name. Use this variable for additional
distinguishing of the archives by the backup plan names.
[Virtual Host Name] - substitution for the name of the virtual machine host. Use this variable in
cases, when two or more virtual machines from different hosts have the same names.
Example: You create the centralized backup plan, named for example, SYSTEMBACKUP, that will be
deployed to three machines (say, FINDEPT1, FINDEPT2, FINDEPT3). In the Name field you specify
[Machine Name]_[Plan name]_Archive(N). Thus, the following three archives will be created in the
location:
FINDEPT1_SYSTEMBACKUP_Archive(1)
FINDEPT2_SYSTEMBACKUP_Archive(1)
FINDEPT3_SYSTEMBACKUP_Archive(1)
15.3.5 Centralized backup plan's credentials
Provide the credentials under which the centralized tasks will run on the machines.
To specify credentials
1. Select one of the following:
Use Acronis service credentials
The tasks will run under the Acronis service account, whether started manually or executed
on schedule.
Use the following credentials
The tasks will run under the credentials you specify, whether started manually or executed
on schedule.
Specify:
User name. When entering the name of an Active Directory user account, be sure to also
specify the domain name (DOMAIN\Username or Username@domain).
Password. The password for the account.
Confirm password. Re-enter the password.
2. Click OK.
To learn more about Acronis service credentials, see the List of Acronis services (p. 32) section.
To learn more about operations available depending on the user privileges, see the User privileges on
a managed machine (p. 32) section.
15.3.6 What if a machine does not have data meeting the selection
rules
A centralized backup plan can be deployed to a machine that does not have data meeting the
selection rules. No error or warning will be logged during the plan deployment because it is assumed