User`s guide

2.14.6. Deduplication ............................................................................................................................................. 77
2.14.7. Privileges for centralized management.................................................................................................... 82
2.14.8. Communication between Acronis Backup & Recovery 10 components ............................................... 89
3. Options ................................................................................................................ 96
3.1. Console options ................................................................................................................. 96
3.1.1. Startup page ............................................................................................................................................... 96
3.1.2. Pop-up messages ....................................................................................................................................... 96
3.1.3. Time-based alerts ...................................................................................................................................... 97
3.1.4. Number of tasks ......................................................................................................................................... 97
3.1.5. Fonts ........................................................................................................................................................... 98
3.2. Management server options ............................................................................................. 98
3.2.1. Logging level ............................................................................................................................................... 98
3.2.2. Log cleanup rules ....................................................................................................................................... 98
3.2.3. Event tracing .............................................................................................................................................. 99
3.2.4. Domain access credentials ...................................................................................................................... 100
3.2.5. Acronis WOL Proxy .................................................................................................................................. 100
3.2.6. VM protection options ............................................................................................................................ 101
3.3. Machine options ............................................................................................................. 102
3.3.1. Machine management ............................................................................................................................ 102
3.3.2. Event tracing ............................................................................................................................................ 103
3.3.3. Log cleanup rules ..................................................................................................................................... 105
3.4. Default backup and recovery options ............................................................................. 105
3.4.1. Default backup options ........................................................................................................................... 105
3.4.2. Default recovery options ......................................................................................................................... 129
4. Vaults ................................................................................................................ 138
4.1. Centralized vaults ............................................................................................................ 139
4.1.1. Working with the "Centralized vault" view............................................................................................ 140
4.1.2. Actions on centralized vaults .................................................................................................................. 141
4.1.3. Tape libraries ............................................................................................................................................ 146
4.2. Personal vaults ................................................................................................................ 170
4.2.1. Working with the "Personal vault" view ................................................................................................ 171
4.2.2. Actions on personal vaults ...................................................................................................................... 172
4.3. Common operations ....................................................................................................... 173
4.3.1. Operations with archives stored in a vault ............................................................................................ 173
4.3.2. Operations with backups ........................................................................................................................ 174
4.3.3. Deleting archives and backups ............................................................................................................... 175
4.3.4. Filtering and sorting archives .................................................................................................................. 176
5. Scheduling .......................................................................................................... 177
5.1. Daily schedule ................................................................................................................. 178
5.2. Weekly schedule ............................................................................................................. 180
5.3. Monthly schedule ............................................................................................................ 182
5.4. At Windows Event Log event .......................................................................................... 185
5.5. Advanced scheduling settings ......................................................................................... 187
5.6. Conditions ....................................................................................................................... 188
5.6.1. User is idle ................................................................................................................................................ 189
5.6.2. Location's host is available ...................................................................................................................... 189
5.6.3. Fits time interval ...................................................................................................................................... 190
5.6.4. User logged off ......................................................................................................................................... 191
5.6.5. Time since last backup ............................................................................................................................. 191