User`s guide
3.1.1 Startup page .................................................................................................................................................. 80
3.1.2 Pop-up messages .......................................................................................................................................... 80
3.1.3 Time-based alerts .......................................................................................................................................... 81
3.1.4 Number of tasks ............................................................................................................................................ 81
3.1.5 Fonts ............................................................................................................................................................... 81
3.2 Management server options ...................................................................................................82
3.2.1 Logging level .................................................................................................................................................. 82
3.2.2 Log cleanup rules ........................................................................................................................................... 82
3.2.3 Event tracing .................................................................................................................................................. 83
3.2.4 Domain access credentials ........................................................................................................................... 84
3.2.5 Acronis WOL Proxy ........................................................................................................................................ 84
3.2.6 VM protection options .................................................................................................................................. 84
3.2.7 Online backup proxy ..................................................................................................................................... 85
3.3 Machine options ......................................................................................................................86
3.3.1 Machine management.................................................................................................................................. 86
3.3.2 Event tracing .................................................................................................................................................. 87
3.3.3 Log cleanup rules ........................................................................................................................................... 89
3.3.4 Online backup proxy ..................................................................................................................................... 89
3.3.5 Customer Experience Program .................................................................................................................... 89
3.4 Default backup and recovery options ......................................................................................90
3.4.1 Default backup options ................................................................................................................................. 90
3.4.2 Default recovery options ............................................................................................................................ 112
4 Vaults ................................................................................................................................ 121
4.1 Centralized vaults ..................................................................................................................122
4.1.1 Working with the "Centralized vault" view ............................................................................................... 123
4.1.2 Actions on centralized vaults ...................................................................................................................... 124
4.1.3 Tape libraries ............................................................................................................................................... 129
4.2 Personal vaults .......................................................................................................................152
4.2.1 Working with the "Personal vault" view ................................................................................................... 153
4.2.2 Actions on personal vaults .......................................................................................................................... 154
4.3 Common operations ..............................................................................................................155
4.3.1 Operations with archives stored in a vault ................................................................................................ 155
4.3.2 Operations with backups ............................................................................................................................ 156
4.3.3 Deleting archives and backups ................................................................................................................... 157
4.3.4 Filtering and sorting archives ..................................................................................................................... 158
5 Scheduling ......................................................................................................................... 159
5.1 Daily schedule ........................................................................................................................160
5.2 Weekly schedule ....................................................................................................................162
5.3 Monthly schedule ..................................................................................................................164
5.4 Advanced scheduling settings ...............................................................................................166
5.5 At Windows Event Log event .................................................................................................168
5.6 When an ADRM alert is received ...........................................................................................170
5.7 Conditions ..............................................................................................................................170
5.7.1 User is idle .................................................................................................................................................... 171
5.7.2 Location's host is available ......................................................................................................................... 171
5.7.3 Fits time interval .......................................................................................................................................... 172
5.7.4 User logged off ............................................................................................................................................ 173
5.7.5 Time since last backup ................................................................................................................................ 173