User`s guide

2.14.4 Policies on machines and groups ................................................................................................................. 64
2.14.5 Backup policy's state and statuses ............................................................................................................... 68
2.14.6 Deduplication ................................................................................................................................................ 71
2.14.7 Privileges for centralized management ....................................................................................................... 76
2.14.8 Communication between Acronis Backup & Recovery 10 components .................................................. 82
3 Options ............................................................................................................................... 89
3.1 Console options .......................................................................................................................89
3.1.1 Startup page .................................................................................................................................................. 89
3.1.2 Pop-up messages .......................................................................................................................................... 89
3.1.3 Time-based alerts .......................................................................................................................................... 90
3.1.4 Number of tasks ............................................................................................................................................ 90
3.1.5 Fonts ............................................................................................................................................................... 90
3.2 Management server options ...................................................................................................91
3.2.1 Logging level .................................................................................................................................................. 91
3.2.2 Log cleanup rules ........................................................................................................................................... 91
3.2.3 Event tracing .................................................................................................................................................. 92
3.2.4 Domain access credentials ........................................................................................................................... 93
3.2.5 Acronis WOL Proxy ........................................................................................................................................ 93
3.2.6 VM protection options .................................................................................................................................. 93
3.2.7 Online backup proxy ..................................................................................................................................... 94
3.3 Machine options ......................................................................................................................95
3.3.1 Machine management.................................................................................................................................. 95
3.3.2 Event tracing .................................................................................................................................................. 96
3.3.3 Log cleanup rules ........................................................................................................................................... 98
3.3.4 Online backup proxy ..................................................................................................................................... 98
3.3.5 Customer Experience Program .................................................................................................................... 98
3.4 Default backup and recovery options ......................................................................................99
3.4.1 Default backup options ................................................................................................................................. 99
3.4.2 Default recovery options ............................................................................................................................ 121
4 Vaults ................................................................................................................................ 130
4.1 Centralized vaults ..................................................................................................................131
4.1.1 Working with the "Centralized vault" view ............................................................................................... 132
4.1.2 Actions on centralized vaults ...................................................................................................................... 133
4.1.3 Tape libraries ............................................................................................................................................... 138
4.2 Personal vaults .......................................................................................................................161
4.2.1 Working with the "Personal vault" view ................................................................................................... 162
4.2.2 Actions on personal vaults .......................................................................................................................... 163
4.3 Common operations ..............................................................................................................164
4.3.1 Operations with archives stored in a vault ................................................................................................ 164
4.3.2 Operations with backups ............................................................................................................................ 165
4.3.3 Deleting archives and backups ................................................................................................................... 166
4.3.4 Filtering and sorting archives ..................................................................................................................... 167
5 Scheduling ......................................................................................................................... 168
5.1 Daily schedule ........................................................................................................................169
5.2 Weekly schedule ....................................................................................................................171
5.3 Monthly schedule ..................................................................................................................173
5.4 At Windows Event Log event .................................................................................................175
5.5 Advanced scheduling settings ...............................................................................................177
5.6 When an ADRM alert is received ...........................................................................................179