User`s guide

3.1.3. Time-based alerts ...................................................................................................................................... 82
3.1.4. Number of tasks ......................................................................................................................................... 82
3.1.5. Fonts ........................................................................................................................................................... 83
3.2. Management server options ............................................................................................. 83
3.2.1. Logging level ............................................................................................................................................... 83
3.2.2. Log cleanup rules ....................................................................................................................................... 83
3.2.3. Event tracing .............................................................................................................................................. 84
3.2.4. Domain access credentials ........................................................................................................................ 85
3.2.5. Acronis WOL Proxy .................................................................................................................................... 85
3.2.6. VM protection options .............................................................................................................................. 86
3.3. Machine options ............................................................................................................... 87
3.3.1. Machine management .............................................................................................................................. 87
3.3.2. Event tracing .............................................................................................................................................. 88
3.3.3. Log cleanup rules ....................................................................................................................................... 90
3.4. Default backup and recovery options ............................................................................... 90
3.4.1. Default backup options ............................................................................................................................. 90
3.4.2. Default recovery options ......................................................................................................................... 114
4. Vaults ................................................................................................................ 123
4.1. Centralized vaults ............................................................................................................ 124
4.1.1. Working with the "Centralized vault" view............................................................................................ 125
4.1.2. Actions on centralized vaults .................................................................................................................. 126
4.1.3. Tape libraries ............................................................................................................................................ 131
4.2. Personal vaults ................................................................................................................ 155
4.2.1. Working with the "Personal vault" view ................................................................................................ 156
4.2.2. Actions on personal vaults ...................................................................................................................... 157
4.3. Common operations ....................................................................................................... 158
4.3.1. Operations with archives stored in a vault ............................................................................................ 158
4.3.2. Operations with backups ........................................................................................................................ 159
4.3.3. Deleting archives and backups ............................................................................................................... 160
4.3.4. Filtering and sorting archives .................................................................................................................. 161
5. Scheduling .......................................................................................................... 162
5.1. Daily schedule ................................................................................................................. 163
5.2. Weekly schedule ............................................................................................................. 165
5.3. Monthly schedule ............................................................................................................ 167
5.4. Advanced scheduling settings ......................................................................................... 170
5.5. At Windows Event Log event .......................................................................................... 171
5.6. Conditions ....................................................................................................................... 173
5.6.1. User is idle ................................................................................................................................................ 174
5.6.2. Location's host is available ...................................................................................................................... 174
5.6.3. Fits time interval ...................................................................................................................................... 175
5.6.4. User logged off ......................................................................................................................................... 176
5.6.5. Time since last backup ............................................................................................................................. 176
6. Direct management ............................................................................................ 178
6.1. Administering a managed machine ................................................................................ 178
6.1.1. Dashboard ................................................................................................................................................ 178
6.1.2. Backup plans and tasks ............................................................................................................................ 180
6.1.3. Log ............................................................................................................................................................. 191
6.2. Creating a backup plan .................................................................................................... 194