User`s guide

6.10.5. Recovering MD devices and logical volumes ......................................................................................... 265
6.10.6. Acronis PXE Server ................................................................................................................................... 269
6.11. Disk management ........................................................................................................... 270
6.11.1. Basic precautions ..................................................................................................................................... 271
6.11.2. Running Acronis Disk Director Lite ......................................................................................................... 271
6.11.3. Choosing the operating system for disk management ......................................................................... 272
6.11.4. "Disk management" view ........................................................................................................................ 272
6.11.5. Disk operations ........................................................................................................................................ 273
6.11.6. Volume operations .................................................................................................................................. 279
6.11.7. Pending operations .................................................................................................................................. 285
6.12. Collecting system information ........................................................................................ 286
7. Centralized management .................................................................................... 287
7.1. Administering Acronis Backup & Recovery 10 Management Server .............................. 287
7.1.1. Dashboard ................................................................................................................................................ 287
7.1.2. Backup policies ......................................................................................................................................... 289
7.1.3. Physical machines .................................................................................................................................... 294
7.1.4. Virtual machines ...................................................................................................................................... 312
7.1.5. Storage nodes .......................................................................................................................................... 316
7.1.6. Tasks.......................................................................................................................................................... 319
7.1.7. Log ............................................................................................................................................................. 322
7.1.8. Reporting .................................................................................................................................................. 326
7.2. Configuring Acronis Backup & Recovery 10 components ............................................... 332
7.2.1. Parameters set through administrative template ................................................................................. 332
7.2.2. Parameters set through GUI ................................................................................................................... 347
7.2.3. Parameters set through Windows registry ............................................................................................ 347
7.3. Creating a backup policy ................................................................................................. 348
7.3.1. Policy credentials ..................................................................................................................................... 351
7.3.2. Items to back up....................................................................................................................................... 351
7.3.3. Access credentials for source .................................................................................................................. 356
7.3.4. Exclusions ................................................................................................................................................. 356
7.3.5. Archive ...................................................................................................................................................... 357
7.3.6. Access credentials for location ............................................................................................................... 358
7.3.7. Backup scheme selection ........................................................................................................................ 358
7.3.8. Archive validation .................................................................................................................................... 369
Glossary ................................................................................................................................... 370
Index ........................................................................................................................................ 385