User`s guide

Copyright © Acronis, Inc., 2000-2010 363
Archive validation • 188, 203, 358
At Windows Event Log event • 164
Attaching a managed vault • 122, 126
B
Back up later scheme • 195, 349
Back up now scheme • 195, 348
Backing up dynamic volumes (Windows) •
40, 206
Backing up to tape library • 131
Backup • 24, 28, 361, 364, 365, 366, 368,
369, 373
Backup archive (Archive) • 18, 24, 361,
362, 364, 365, 368, 369, 370, 371, 372,
373
Backup operation • 361, 362
Backup options • 362, 368
Backup performance • 95
Backup plan (Plan) • 8, 19, 24, 49, 187,
361, 362, 363, 364, 365, 369, 370, 371,
372, 373
Backup plan details • 173, 177, 183, 291
Backup plan execution states • 172, 173,
183, 281
Backup plan statuses • 82, 172, 173, 183,
289
Backup plans and tasks • 172, 189
Backup plan's credentials • 187, 189
Backup policies • 276
Backup policy (Policy) • 18, 49, 362, 364,
365, 370, 371
Backup policy deployment states • 276,
277
Backup policy statuses • 276, 277, 281,
289
Backup policy's state and statuses • 58,
277
Backup priority • 87, 95
Backup scheme • 362, 363, 369, 372
Backup scheme selection • 338, 348
Backup schemes • 188, 194
Backup selection • 225, 227, 229, 230,
233, 235
Backup splitting • 87, 100
Basic concepts • 8, 24, 49, 187
Basic disk cloning • 260, 261
Basic precautions • 258
Bootability troubleshooting • 220
Bootable agent • 45, 241, 360, 363
Bootable media • 9, 20, 24, 101, 171, 205,
241, 259, 275, 360, 363, 366, 370
Bootable Media Builder • 20
Building Bart PE with Acronis Plug-in from
Windows distribution • 243, 249
Built-in group • 54, 363
C
Case to analyze • 136, 137, 143
Centralized backup plan • 45, 49, 362,
363, 364
Centralized log entry details • 312, 315
Centralized management • 49, 274, 364,
365
Centralized task • 363, 364, 366
Centralized vault • 18, 19, 50, 364, 369,
370
Centralized vaults • 119, 309
Change volume label • 266, 271
Change volume letter • 266, 271
Changing disk status • 266
Choosing a backup scheme • 135
Choosing the operating system for disk
management • 259, 266
Cleanup • 24, 127, 361, 363, 364, 365,
371, 373
Client and server applications • 70
Cloning method and advanced options •
262
Collecting system information • 273
Column selection • 321
Common operations • 152