User guide

3 Copyright © Acronis International GmbH, 2002-2012.
Table of contents
1 Introducing Acronis Backup & Recovery 11.5 ........................................................................... 8
1.1 What's new in Acronis Backup & Recovery 11.5 ....................................................................... 8
1.2 Acronis Backup & Recovery 11.5 components .......................................................................... 8
1.2.1 Agent for Windows ....................................................................................................................................... 8
1.2.2 Management Console .................................................................................................................................. 9
1.2.3 Bootable Media Builder ............................................................................................................................... 9
1.3 About the trial product version ...............................................................................................10
1.4 Supported file systems ............................................................................................................10
1.5 Technical Support ....................................................................................................................10
2 Getting started ...................................................................................................................... 12
2.1 Using the management console ..............................................................................................13
2.1.1 "Navigation" pane ......................................................................................................................................14
2.1.2 Main area, views and action pages ............................................................................................................15
2.1.3 Console options ..........................................................................................................................................18
3 Understanding Acronis Backup & Recovery 11.5 .................................................................... 21
3.1 Owners .....................................................................................................................................21
3.2 Credentials used in backup plans and tasks ............................................................................21
3.3 User privileges on a managed machine ...................................................................................23
3.4 List of Acronis services .............................................................................................................23
3.5 Full, incremental and differential backups ..............................................................................25
3.6 What does a disk or volume backup store? .............................................................................26
3.7 Backup and recovery of dynamic volumes (Windows) ............................................................27
3.8 Support for UEFI-based machines ...........................................................................................29
3.9 Compatibility with encryption software ..................................................................................29
3.10 Support for SNMP ....................................................................................................................30
4 Backup .................................................................................................................................. 32
4.1 Back up now .............................................................................................................................32
4.2 Creating a backup plan ............................................................................................................32
4.2.1 Selecting data to back up ...........................................................................................................................34
4.2.2 Access credentials for source .....................................................................................................................35
4.2.3 Source files exclusion .................................................................................................................................35
4.2.4 Backup location selection ...........................................................................................................................37
4.2.5 Access credentials for archive location ......................................................................................................39
4.2.6 Backup schemes .........................................................................................................................................40
4.2.7 Archive validation .......................................................................................................................................49
4.2.8 Backup plan's credentials ...........................................................................................................................50
4.2.9 Label (Preserving machine properties in a backup) ..................................................................................50
4.2.10 Why is the program asking for the password? ..........................................................................................52
4.3 Simplified naming of backup files ............................................................................................52
4.3.1 The [DATE] variable ....................................................................................................................................53
4.3.2 Backup splitting and simplified file naming ...............................................................................................53
4.3.3 Usage examples ..........................................................................................................................................54