User`s guide
374 Copyright © Acronis, Inc., 2000-2009
You can use one or more wildcard characters * and ? in a file mask:
The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask
Doc*.txt yields files such as Doc.txt and Document.txt
The question mark (?) substitutes for exactly one character in a file name; for example, the file
mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt
Exclusion examples
Criterion Example Description
By name File1.log Excludes all files named File1.log.
By path C:\Finance\test.log Excludes the file named test.log located in the folder
C:\Finance
Mask (*) *.log Excludes all files with the .log extension.
Mask (?) my???.log Excludes all .log files with names consisting of five symbols
and starting with “my”.
7.3.5. Archive
Specify where to store the archives and define names for the new backup archives.
1. Selecting the archives destination
Choose where to store machines' archives:
• Store all machines' archives in a single location
o To store archives in a centralized vault, expand the Centralized group and click the vault.
o To store archives on a network share, expand the Network folders group, then select the
required networked machine and then click the shared folder. If the network share requires
access credentials, the program will ask for them.
o To store archives on an FTP or SFTP server, expand the corresponding group and reach the
appropriate server, then select the folder that will be used for storing archives.
According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.
• Store each machine's archive in the specified folder on the machine
Enter the full path to the folder in the Path field. This path will be created on each machine the
policy will be applied to.
• Store each machine's archive in the machine's Acronis Secure Zone
Acronis Secure Zone has to be created on each machine the policy will be applied to. For
information on how to create Acronis Secure Zone, see the Creating Acronis Secure Zone (p. 266)
section.
2. Naming the archives
Data from each machine will be backed up to a separate archive. Specify names for the archives.