User`s guide

2.15 Understanding centralized management ................................................................................60
2.15.1 Basic concepts ............................................................................................................................................60
2.15.2 Setting up centralized data protection in a heterogeneous network ......................................................61
2.15.3 Grouping the registered machines ............................................................................................................65
2.15.4 Policies on machines and groups ...............................................................................................................67
2.15.5 Backup policy's state and statuses .............................................................................................................72
2.15.6 Deduplication .............................................................................................................................................75
2.15.7 Privileges for centralized management .....................................................................................................79
2.15.8 Communication between Acronis Backup & Recovery 10 components ..................................................86
3 Options .................................................................................................................................. 93
3.1 Console options .......................................................................................................................93
3.1.1 Startup page ...............................................................................................................................................93
3.1.2 Pop-up messages ........................................................................................................................................93
3.1.3 Time-based alerts .......................................................................................................................................94
3.1.4 Number of tasks .........................................................................................................................................94
3.1.5 Fonts ...........................................................................................................................................................94
3.2 Management server options ...................................................................................................95
3.2.1 Logging level ...............................................................................................................................................95
3.2.2 Log cleanup rules ........................................................................................................................................95
3.2.3 Event tracing ...............................................................................................................................................96
3.2.4 Domain access credentials .........................................................................................................................97
3.2.5 Acronis WOL Proxy .....................................................................................................................................97
3.2.6 VM protection options ...............................................................................................................................97
3.2.7 Online backup proxy ...................................................................................................................................98
3.3 Machine options ......................................................................................................................99
3.3.1 Machine management ...............................................................................................................................99
3.3.2 Event tracing ............................................................................................................................................ 100
3.3.3 Log cleanup rules ..................................................................................................................................... 102
3.3.4 Online backup proxy ................................................................................................................................ 102
3.3.5 Customer Experience Program ............................................................................................................... 102
3.4 Default backup and recovery options ................................................................................... 103
3.4.1 Default backup options ........................................................................................................................... 103
3.4.2 Default recovery options ......................................................................................................................... 125
4 Vaults .................................................................................................................................. 135
4.1 Centralized vaults ................................................................................................................. 136
4.1.1 Working with the "Centralized vault" view ............................................................................................ 137
4.1.2 Actions on centralized vaults .................................................................................................................. 138
4.1.3 Tape libraries ........................................................................................................................................... 143
4.2 Personal vaults ...................................................................................................................... 166
4.2.1 Working with the "Personal vault" view ................................................................................................. 167
4.2.2 Actions on personal vaults ...................................................................................................................... 168
4.3 Common operations ............................................................................................................. 169
4.3.1 Operations with archives stored in a vault ............................................................................................. 169
4.3.2 Operations with backups ........................................................................................................................ 170
4.3.3 Deleting archives and backups ................................................................................................................ 171
4.3.4 Filtering and sorting archives .................................................................................................................. 172
5 Scheduling ........................................................................................................................... 173
5.1 Daily schedule ....................................................................................................................... 174
5.2 Weekly schedule ................................................................................................................... 176
5.3 Monthly schedule ................................................................................................................. 178