User`s guide
6.8 Acronis Secure Zone ..............................................................................................................248
6.8.1 Creating Acronis Secure Zone .................................................................................................................... 248
6.8.2 Managing Acronis Secure Zone .................................................................................................................. 250
6.9 Acronis Startup Recovery Manager .......................................................................................251
6.10 Bootable media ......................................................................................................................252
6.10.1 How to create bootable media .................................................................................................................. 253
6.10.2 Connecting to a machine booted from media .......................................................................................... 260
6.10.3 Working under bootable media ................................................................................................................. 260
6.10.4 List of commands and utilities available in Linux-based bootable media ............................................... 262
6.10.5 Recovering MD devices and logical volumes ............................................................................................ 263
6.10.6 Acronis PXE Server ...................................................................................................................................... 267
6.11 Disk management ..................................................................................................................268
6.11.1 Basic precautions......................................................................................................................................... 269
6.11.2 Running Acronis Disk Director Lite ............................................................................................................. 269
6.11.3 Choosing the operating system for disk management ............................................................................ 270
6.11.4 "Disk management" view ........................................................................................................................... 270
6.11.5 Disk operations ............................................................................................................................................ 271
6.11.6 Volume operations ...................................................................................................................................... 276
6.11.7 Pending operations ..................................................................................................................................... 283
6.12 Collecting system information ...............................................................................................283
7 Centralized management ................................................................................................... 284
7.1 Administering Acronis Backup & Recovery 10 Management Server .....................................284
7.1.1 Dashboard .................................................................................................................................................... 284
7.1.2 Backup policies ............................................................................................................................................ 286
7.1.3 Physical machines ....................................................................................................................................... 291
7.1.4 Virtual machines .......................................................................................................................................... 308
7.1.5 Storage nodes .............................................................................................................................................. 316
7.1.6 Tasks ............................................................................................................................................................. 319
7.1.7 Log ................................................................................................................................................................ 321
7.1.8 Reporting ..................................................................................................................................................... 325
7.2 Configuring Acronis Backup & Recovery 10 components .....................................................330
7.2.1 Parameters set through administrative template .................................................................................... 331
7.2.2 Parameters set through GUI....................................................................................................................... 345
7.2.3 Parameters set through Windows registry ............................................................................................... 345
7.3 Creating a backup policy ........................................................................................................346
7.3.1 Policy credentials ......................................................................................................................................... 348
7.3.2 Items to back up .......................................................................................................................................... 349
7.3.3 Access credentials for source ..................................................................................................................... 353
7.3.4 Exclusions ..................................................................................................................................................... 353
7.3.5 Archive ......................................................................................................................................................... 354
7.3.6 Access credentials for location ................................................................................................................... 355
7.3.7 Backup scheme selection ........................................................................................................................... 356
7.3.8 Archive validation ........................................................................................................................................ 365
8 Glossary ............................................................................................................................ 366
9 Index ................................................................................................................................. 381