User`s guide

6.10.6. Acronis PXE Server ................................................................................................................................... 268
6.11. Disk management ........................................................................................................... 270
6.11.1. Basic precautions ..................................................................................................................................... 270
6.11.2. Running Acronis Disk Director Lite ......................................................................................................... 270
6.11.3. Choosing the operating system for disk management ......................................................................... 271
6.11.4. "Disk management" view ........................................................................................................................ 271
6.11.5. Disk operations ........................................................................................................................................ 272
6.11.6. Volume operations .................................................................................................................................. 278
6.11.7. Pending operations .................................................................................................................................. 285
6.12. Collecting system information ........................................................................................ 285
7. Centralized management .................................................................................... 286
7.1. Administering Acronis Backup & Recovery 10 Management Server .............................. 286
7.1.1. Dashboard ................................................................................................................................................ 286
7.1.2. Backup policies ......................................................................................................................................... 288
7.1.3. Physical machines .................................................................................................................................... 293
7.1.4. Virtual machines ...................................................................................................................................... 311
7.1.5. Storage nodes .......................................................................................................................................... 315
7.1.6. Tasks.......................................................................................................................................................... 318
7.1.7. Log ............................................................................................................................................................. 320
7.1.8. Reporting .................................................................................................................................................. 324
7.2. Configuring Acronis Backup & Recovery 10 components ............................................... 330
7.2.1. Parameters set through administrative template ................................................................................. 330
7.2.2. Parameters set through GUI ................................................................................................................... 345
7.2.3. Parameters set through Windows registry ............................................................................................ 346
7.3. Creating a backup policy ................................................................................................. 346
7.3.1. Policy credentials ..................................................................................................................................... 349
7.3.2. Items to back up....................................................................................................................................... 349
7.3.3. Access credentials for source .................................................................................................................. 354
7.3.4. Exclusions ................................................................................................................................................. 354
7.3.5. Archive ...................................................................................................................................................... 355
7.3.6. Access credentials for location ............................................................................................................... 356
7.3.7. Backup scheme selection ........................................................................................................................ 357
7.3.8. Archive validation .................................................................................................................................... 367
Glossary ................................................................................................................................... 368
Index ........................................................................................................................................ 383