User`s guide
3.1.1 Startup page ...............................................................................................................................................80
3.1.2 Pop-up messages ........................................................................................................................................80
3.1.3 Time-based alerts .......................................................................................................................................81
3.1.4 Number of tasks .........................................................................................................................................81
3.1.5 Fonts ...........................................................................................................................................................81
3.2 Management server options ...................................................................................................82
3.2.1 Logging level ...............................................................................................................................................82
3.2.2 Log cleanup rules ........................................................................................................................................82
3.2.3 Event tracing ...............................................................................................................................................83
3.2.4 Domain access credentials .........................................................................................................................84
3.2.5 Acronis WOL Proxy .....................................................................................................................................84
3.2.6 VM protection options ...............................................................................................................................84
3.2.7 Online backup proxy ...................................................................................................................................85
3.3 Machine options ......................................................................................................................86
3.3.1 Machine management ...............................................................................................................................86
3.3.2 Event tracing ...............................................................................................................................................87
3.3.3 Log cleanup rules ........................................................................................................................................89
3.3.4 Online backup proxy ...................................................................................................................................89
3.3.5 Customer Experience Program ..................................................................................................................89
3.4 Default backup and recovery options ......................................................................................90
3.4.1 Default backup options ..............................................................................................................................90
3.4.2 Default recovery options ......................................................................................................................... 112
4 Vaults .................................................................................................................................. 121
4.1 Centralized vaults ................................................................................................................. 122
4.1.1 Working with the "Centralized vault" view ............................................................................................ 123
4.1.2 Actions on centralized vaults .................................................................................................................. 124
4.1.3 Tape libraries ........................................................................................................................................... 129
4.2 Personal vaults ...................................................................................................................... 152
4.2.1 Working with the "Personal vault" view ................................................................................................. 153
4.2.2 Actions on personal vaults ...................................................................................................................... 154
4.3 Common operations ............................................................................................................. 155
4.3.1 Operations with archives stored in a vault ............................................................................................. 155
4.3.2 Operations with backups ........................................................................................................................ 156
4.3.3 Deleting archives and backups ................................................................................................................ 157
4.3.4 Filtering and sorting archives .................................................................................................................. 158
5 Scheduling ........................................................................................................................... 159
5.1 Daily schedule ....................................................................................................................... 160
5.2 Weekly schedule ................................................................................................................... 162
5.3 Monthly schedule ................................................................................................................. 164
5.4 Advanced scheduling settings .............................................................................................. 166
5.5 At Windows Event Log event ................................................................................................ 168
5.6 When an ADRM alert is received .......................................................................................... 170
5.7 Conditions ............................................................................................................................. 170
5.7.1 User is idle ................................................................................................................................................ 171
5.7.2 Location's host is available ...................................................................................................................... 171
5.7.3 Fits time interval ...................................................................................................................................... 172
5.7.4 User logged off ........................................................................................................................................ 172
5.7.5 Time since last backup ............................................................................................................................ 173