User`s guide
3.1.1 Startup page .................................................................................................................................................. 79
3.1.2 Pop-up messages .......................................................................................................................................... 79
3.1.3 Time-based alerts .......................................................................................................................................... 80
3.1.4 Number of tasks ............................................................................................................................................ 80
3.1.5 Fonts ............................................................................................................................................................... 80
3.2 Management server options ...................................................................................................81
3.2.1 Logging level .................................................................................................................................................. 81
3.2.2 Log cleanup rules ........................................................................................................................................... 81
3.2.3 Event tracing .................................................................................................................................................. 82
3.2.4 Domain access credentials ........................................................................................................................... 83
3.2.5 Acronis WOL Proxy ........................................................................................................................................ 83
3.2.6 VM protection options .................................................................................................................................. 83
3.2.7 Online backup proxy ..................................................................................................................................... 84
3.3 Machine options ......................................................................................................................85
3.3.1 Machine management.................................................................................................................................. 85
3.3.2 Event tracing .................................................................................................................................................. 86
3.3.3 Log cleanup rules ........................................................................................................................................... 88
3.3.4 Online backup proxy ..................................................................................................................................... 88
3.3.5 Customer Experience Program .................................................................................................................... 88
3.4 Default backup and recovery options ......................................................................................89
3.4.1 Default backup options ................................................................................................................................. 89
3.4.2 Default recovery options ............................................................................................................................ 111
4 Vaults ................................................................................................................................ 120
4.1 Centralized vaults ..................................................................................................................121
4.1.1 Working with the "Centralized vault" view ............................................................................................... 122
4.1.2 Actions on centralized vaults ...................................................................................................................... 123
4.1.3 Tape libraries ............................................................................................................................................... 128
4.2 Personal vaults .......................................................................................................................151
4.2.1 Working with the "Personal vault" view ................................................................................................... 152
4.2.2 Actions on personal vaults .......................................................................................................................... 153
4.3 Common operations ..............................................................................................................154
4.3.1 Operations with archives stored in a vault ................................................................................................ 154
4.3.2 Operations with backups ............................................................................................................................ 155
4.3.3 Deleting archives and backups ................................................................................................................... 156
4.3.4 Filtering and sorting archives ..................................................................................................................... 157
5 Scheduling ......................................................................................................................... 158
5.1 Daily schedule ........................................................................................................................159
5.2 Weekly schedule ....................................................................................................................161
5.3 Monthly schedule ..................................................................................................................163
5.4 Advanced scheduling settings ...............................................................................................165
5.5 At Windows Event Log event .................................................................................................167
5.6 When an ADRM alert is received ...........................................................................................169
5.7 Conditions ..............................................................................................................................169
5.7.1 User is idle .................................................................................................................................................... 170
5.7.2 Location's host is available ......................................................................................................................... 170
5.7.3 Fits time interval .......................................................................................................................................... 171
5.7.4 User logged off ............................................................................................................................................ 172
5.7.5 Time since last backup ................................................................................................................................ 172