User`s guide
2.15 Understanding centralized management ................................................................................60
2.15.1 Basic concepts ............................................................................................................................................... 60
2.15.2 Setting up centralized data protection in a heterogeneous network ....................................................... 61
2.15.3 Grouping the registered machines .............................................................................................................. 65
2.15.4 Policies on machines and groups ................................................................................................................. 67
2.15.5 Backup policy's state and statuses ............................................................................................................... 72
2.15.6 Deduplication ................................................................................................................................................ 75
2.15.7 Privileges for centralized management ....................................................................................................... 79
2.15.8 Communication between Acronis Backup & Recovery 10 components .................................................. 86
3 Options ............................................................................................................................... 93
3.1 Console options .......................................................................................................................93
3.1.1 Startup page .................................................................................................................................................. 93
3.1.2 Pop-up messages .......................................................................................................................................... 93
3.1.3 Time-based alerts .......................................................................................................................................... 94
3.1.4 Number of tasks ............................................................................................................................................ 94
3.1.5 Fonts ............................................................................................................................................................... 94
3.2 Management server options ...................................................................................................95
3.2.1 Logging level .................................................................................................................................................. 95
3.2.2 Log cleanup rules ........................................................................................................................................... 95
3.2.3 Event tracing .................................................................................................................................................. 96
3.2.4 Domain access credentials ........................................................................................................................... 97
3.2.5 Acronis WOL Proxy ........................................................................................................................................ 97
3.2.6 VM protection options .................................................................................................................................. 97
3.2.7 Online backup proxy ..................................................................................................................................... 98
3.3 Machine options ......................................................................................................................99
3.3.1 Machine management.................................................................................................................................. 99
3.3.2 Event tracing ................................................................................................................................................ 100
3.3.3 Log cleanup rules ......................................................................................................................................... 102
3.3.4 Online backup proxy ................................................................................................................................... 102
3.3.5 Customer Experience Program .................................................................................................................. 102
3.4 Default backup and recovery options ....................................................................................103
3.4.1 Default backup options ............................................................................................................................... 103
3.4.2 Default recovery options ............................................................................................................................ 125
4 Vaults ................................................................................................................................ 135
4.1 Centralized vaults ..................................................................................................................136
4.1.1 Working with the "Centralized vault" view ............................................................................................... 137
4.1.2 Actions on centralized vaults ...................................................................................................................... 138
4.1.3 Tape libraries ............................................................................................................................................... 143
4.2 Personal vaults .......................................................................................................................166
4.2.1 Working with the "Personal vault" view ................................................................................................... 167
4.2.2 Actions on personal vaults .......................................................................................................................... 168
4.3 Common operations ..............................................................................................................169
4.3.1 Operations with archives stored in a vault ................................................................................................ 169
4.3.2 Operations with backups ............................................................................................................................ 170
4.3.3 Deleting archives and backups ................................................................................................................... 171
4.3.4 Filtering and sorting archives ..................................................................................................................... 172
5 Scheduling ......................................................................................................................... 173
5.1 Daily schedule ........................................................................................................................174
5.2 Weekly schedule ....................................................................................................................176
5.3 Monthly schedule ..................................................................................................................178