User`s guide

3. Options ................................................................................................................ 92
3.1. Console options ................................................................................................................. 92
3.1.1. Startup page ............................................................................................................................................... 92
3.1.2. Pop-up messages ....................................................................................................................................... 92
3.1.3. Time-based alerts ...................................................................................................................................... 93
3.1.4. Number of tasks ......................................................................................................................................... 93
3.1.5. Fonts ........................................................................................................................................................... 94
3.2. Management server options ............................................................................................. 94
3.2.1. Logging level ............................................................................................................................................... 94
3.2.2. Log cleanup rules ....................................................................................................................................... 94
3.2.3. Event tracing .............................................................................................................................................. 95
3.2.4. Domain access credentials ........................................................................................................................ 96
3.2.5. Acronis WOL Proxy .................................................................................................................................... 96
3.2.6. VM protection options .............................................................................................................................. 97
3.3. Machine options ............................................................................................................... 98
3.3.1. Machine management .............................................................................................................................. 98
3.3.2. Event tracing .............................................................................................................................................. 99
3.3.3. Log cleanup rules ..................................................................................................................................... 101
3.4. Default backup and recovery options ............................................................................. 101
3.4.1. Default backup options ........................................................................................................................... 101
3.4.2. Default recovery options ......................................................................................................................... 125
4. Vaults ................................................................................................................ 134
4.1. Centralized vaults ............................................................................................................
135
4.1.1. Working with the "Centralized vault" view............................................................................................ 136
4.1.2. Actions on centralized vaults .................................................................................................................. 137
4.1.3. Tape libraries ............................................................................................................................................ 142
4.2. Personal vaults ................................................................................................................ 166
4.2.1. Working with the "Personal vault" view ................................................................................................ 167
4.2.2. Actions on personal vaults ...................................................................................................................... 168
4.3. Common operations ....................................................................................................... 169
4.3.1. Operations with archives stored in a vault ............................................................................................ 169
4.3.2. Operations with backups ........................................................................................................................ 170
4.3.3. Deleting archives and backups ............................................................................................................... 171
4.3.4. Filtering and sorting archives .................................................................................................................. 172
5. Scheduling .......................................................................................................... 173
5.1. Daily schedule ................................................................................................................. 174
5.2. Weekly schedule ............................................................................................................. 176
5.3. Monthly schedule ............................................................................................................ 179
5.4. At Windows Event Log event .......................................................................................... 181
5.5. Advanced scheduling settings ......................................................................................... 183
5.6. Conditions ....................................................................................................................... 184
5.6.1. User is idle ................................................................................................................................................ 185
5.6.2. Location's host is available ...................................................................................................................... 186
5.6.3. Fits time interval ...................................................................................................................................... 186
5.6.4. User logged off ......................................................................................................................................... 187
5.6.5. Time since last backup ............................................................................................................................. 188
6. Direct management ............................................................................................
189
6.1. Administering a managed machine ................................................................................ 189