User`s guide

2.14.6 Deduplication ................................................................................................................................................ 71
2.14.7 Privileges for centralized management ....................................................................................................... 75
2.14.8 Communication between Acronis Backup & Recovery 10 components .................................................. 81
3 Options ............................................................................................................................... 88
3.1 Console options .......................................................................................................................88
3.1.1 Startup page .................................................................................................................................................. 88
3.1.2 Pop-up messages .......................................................................................................................................... 88
3.1.3 Time-based alerts .......................................................................................................................................... 89
3.1.4 Number of tasks ............................................................................................................................................ 89
3.1.5 Fonts ............................................................................................................................................................... 89
3.2 Management server options ...................................................................................................90
3.2.1 Logging level .................................................................................................................................................. 90
3.2.2 Log cleanup rules ........................................................................................................................................... 90
3.2.3 Event tracing .................................................................................................................................................. 91
3.2.4 Domain access credentials ........................................................................................................................... 92
3.2.5 Acronis WOL Proxy ........................................................................................................................................ 92
3.2.6 VM protection options .................................................................................................................................. 92
3.3 Machine options ......................................................................................................................93
3.3.1 Machine management.................................................................................................................................. 94
3.3.2 Event tracing .................................................................................................................................................. 94
3.3.3 Log cleanup rules ........................................................................................................................................... 96
3.3.4 Customer Experience Program .................................................................................................................... 97
3.4 Default backup and recovery options ......................................................................................
97
3.4.1 Default backup options ................................................................................................................................. 97
3.4.2 Default recovery options ............................................................................................................................ 119
4 Vaults ................................................................................................................................ 128
4.1 Centralized vaults ..................................................................................................................129
4.1.1 Working with the "Centralized vault" view ............................................................................................... 130
4.1.2 Actions on centralized vaults ...................................................................................................................... 131
4.1.3 Tape libraries ............................................................................................................................................... 136
4.2 Personal vaults .......................................................................................................................158
4.2.1 Working with the "Personal vault" view ................................................................................................... 158
4.2.2 Actions on personal vaults .......................................................................................................................... 159
4.3 Common operations ..............................................................................................................161
4.3.1 Operations with archives stored in a vault ................................................................................................ 161
4.3.2 Operations with backups ............................................................................................................................ 162
4.3.3 Deleting archives and backups ................................................................................................................... 163
4.3.4 Filtering and sorting archives ..................................................................................................................... 163
5 Scheduling ......................................................................................................................... 165
5.1 Daily schedule ........................................................................................................................166
5.2 Weekly schedule ....................................................................................................................168
5.3 Monthly schedule ..................................................................................................................170
5.4 At Windows Event Log event .................................................................................................172
5.5 Advanced scheduling settings ...............................................................................................174
5.6 Conditions ..............................................................................................................................175
5.6.1 User is idle .................................................................................................................................................... 176
5.6.2 Location's host is available ......................................................................................................................... 176
5.6.3 Fits time interval .......................................................................................................................................... 177
5.6.4 User logged off ............................................................................................................................................ 178