User`s guide

Copyright © Acronis, Inc., 2000-2009 397
Archive validation • 206, 223, 380
At Windows Event Log event • 181
Attaching a managed vault • 138, 142
B
Back up later scheme • 213, 370
Back up now scheme • 213, 370
Backing up dynamic volumes (Windows)
44, 225
Backing up LVM volumes (Linux) • 46, 277
Backing up RAID arrays (Linux) • 48
Backing up to tape library • 147
Backup • 27, 33, 382, 386, 387, 389, 390,
394
Backup archive (Archive) • 20, 27, 382,
383, 385, 386, 389, 390, 391, 392, 393,
394
Backup operation • 382, 383
Backup options • 383, 389
Backup performance • 111
Backup plan (Plan) • 9, 21, 27, 57, 205,
382, 383, 384, 385, 386, 390, 392, 393,
394
Backup plan details • 192, 195, 201, 315
Backup plan execution states • 191, 192,
201, 306
Backup plan statuses • 98, 191, 193, 201,
313
Backup plans and tasks • 191, 207
Backup plan's credentials • 205, 207
Backup policies • 301
Backup policy (Policy) • 20, 57, 383, 385,
386, 391, 392
Backup policy deployment states • 301,
302
Backup policy statuses • 301, 302, 306,
313
Backup policy's state and statuses • 70,
302
Backup priority • 102, 111
Backup scheme • 383, 384, 390, 393
Backup scheme selection • 361, 370
Backup schemes • 206, 213
Backup selection • 247, 248, 251, 252,
255, 257
Backup splitting • 102, 116
Basic concepts • 8, 27, 57, 205
Basic disk cloning • 285, 286
Basic precautions • 283
Bootability troubleshooting • 47, 241
Bootable agent • 53, 263, 381, 384
Bootable components and media builder •
19
Bootable media • 9, 19, 22, 27, 117, 190,
225, 264, 283, 300, 381, 384, 387, 391
Building Bart PE with Acronis Plug-in from
Windows distribution • 266, 272
Built-in group • 62, 384
C
Case to analyze • 152, 154, 160
Centralized backup plan • 52, 57, 383,
384, 385
Centralized log entry details • 334, 336
Centralized management • 58, 299, 385,
386, 387
Centralized task • 384, 385, 387
Centralized vault • 20, 21, 58, 385, 391
Centralized vaults • 135, 331
Change volume label • 291, 296
Change volume letter • 291, 296
Changing disk status • 290
Choosing a backup scheme • 151
Choosing the operating system for disk
management • 284, 290
Cleanup • 27, 143, 382, 384, 386, 393,
394
Client and server applications • 85
Cloning method and advanced options •
286
Collecting system information • 298
Column selection • 342
Common operations • 169