User`s guide

3.1.3 Time-based alerts .......................................................................................................................................... 77
3.1.4 Number of tasks ............................................................................................................................................ 77
3.1.5 Fonts ............................................................................................................................................................... 77
3.2 Management server options ...................................................................................................78
3.2.1 Logging level .................................................................................................................................................. 78
3.2.2 Log cleanup rules ........................................................................................................................................... 78
3.2.3 Event tracing .................................................................................................................................................. 79
3.2.4 Domain access credentials ........................................................................................................................... 80
3.2.5 Acronis WOL Proxy ........................................................................................................................................ 80
3.2.6 VM protection options .................................................................................................................................. 80
3.3 Machine options ......................................................................................................................81
3.3.1 Machine management.................................................................................................................................. 82
3.3.2 Event tracing .................................................................................................................................................. 82
3.3.3 Log cleanup rules ........................................................................................................................................... 84
3.3.4 Customer Experience Program .................................................................................................................... 85
3.4 Default backup and recovery options ......................................................................................85
3.4.1 Default backup options ................................................................................................................................. 85
3.4.2 Default recovery options ............................................................................................................................ 107
4 Vaults ................................................................................................................................ 115
4.1 Centralized vaults ..................................................................................................................116
4.1.1 Working with the "Centralized vault" view ............................................................................................... 117
4.1.2 Actions on centralized vaults ...................................................................................................................... 118
4.1.3 Tape libraries ............................................................................................................................................... 123
4.2 Personal vaults .......................................................................................................................145
4.2.1 Working with the "Personal vault" view ................................................................................................... 145
4.2.2 Actions on personal vaults .......................................................................................................................... 146
4.3 Common operations ..............................................................................................................148
4.3.1 Operations with archives stored in a vault ................................................................................................ 148
4.3.2 Operations with backups ............................................................................................................................ 149
4.3.3 Deleting archives and backups ................................................................................................................... 150
4.3.4 Filtering and sorting archives ..................................................................................................................... 150
5 Scheduling ......................................................................................................................... 152
5.1 Daily schedule ........................................................................................................................153
5.2 Weekly schedule ....................................................................................................................155
5.3 Monthly schedule ..................................................................................................................157
5.4 Advanced scheduling settings ...............................................................................................159
5.5 At Windows Event Log event .................................................................................................160
5.6 Conditions ..............................................................................................................................162
5.6.1 User is idle .................................................................................................................................................... 163
5.6.2 Location's host is available ......................................................................................................................... 163
5.6.3 Fits time interval .......................................................................................................................................... 164
5.6.4 User logged off ............................................................................................................................................ 165
5.6.5 Time since last backup ................................................................................................................................ 165
6 Direct management ........................................................................................................... 166
6.1 Administering a managed machine .......................................................................................166
6.1.1 Dashboard .................................................................................................................................................... 166
6.1.2 Backup plans and tasks ............................................................................................................................... 168
6.1.3 Log ................................................................................................................................................................ 179