User`s guide
6.8.1 Creating Acronis Secure Zone .................................................................................................................... 243
6.8.2 Managing Acronis Secure Zone .................................................................................................................. 245
6.9 Acronis Startup Recovery Manager .......................................................................................246
6.10 Bootable media ......................................................................................................................247
6.10.1 How to create bootable media .................................................................................................................. 248
6.10.2 Connecting to a machine booted from media .......................................................................................... 255
6.10.3 Working under bootable media ................................................................................................................. 256
6.10.4 List of commands and utilities available in Linux-based bootable media ............................................... 257
6.10.5 Recovering MD devices and logical volumes ............................................................................................ 258
6.10.6 Acronis PXE Server ...................................................................................................................................... 262
6.11 Disk management ..................................................................................................................263
6.11.1 Basic precautions......................................................................................................................................... 264
6.11.2 Running Acronis Disk Director Lite ............................................................................................................. 264
6.11.3 Choosing the operating system for disk management ............................................................................ 265
6.11.4 "Disk management" view ........................................................................................................................... 265
6.11.5 Disk operations ............................................................................................................................................ 266
6.11.6 Volume operations ...................................................................................................................................... 271
6.11.7 Pending operations ..................................................................................................................................... 278
6.12 Collecting system information ...............................................................................................278
7 Centralized management ................................................................................................... 279
7.1 Administering Acronis Backup & Recovery 10 Management Server .....................................279
7.1.1 Dashboard .................................................................................................................................................... 279
7.1.2 Backup policies ............................................................................................................................................ 281
7.1.3 Physical machines ....................................................................................................................................... 286
7.1.4 Virtual machines .......................................................................................................................................... 303
7.1.5 Storage nodes .............................................................................................................................................. 308
7.1.6 Tasks ............................................................................................................................................................. 311
7.1.7 Log ................................................................................................................................................................ 313
7.1.8 Reporting ..................................................................................................................................................... 317
7.2 Configuring Acronis Backup & Recovery 10 components .....................................................322
7.2.1 Parameters set through administrative template .................................................................................... 323
7.2.2 Parameters set through GUI....................................................................................................................... 337
7.2.3 Parameters set through Windows registry ............................................................................................... 337
7.3 Creating a backup policy ........................................................................................................338
7.3.1 Policy credentials ......................................................................................................................................... 340
7.3.2 Items to back up .......................................................................................................................................... 341
7.3.3 Access credentials for source ..................................................................................................................... 345
7.3.4 Exclusions ..................................................................................................................................................... 345
7.3.5 Archive ......................................................................................................................................................... 346
7.3.6 Access credentials for location ................................................................................................................... 347
7.3.7 Backup scheme selection ........................................................................................................................... 348
7.3.8 Archive validation ........................................................................................................................................ 357
8 Glossary ............................................................................................................................ 358
9 Index ................................................................................................................................. 373