User guide
4 Copyright © Acronis International GmbH, 2002-2012
Table of contents
1 Introducing Acronis Backup & Recovery 11.5 ........................................................................ 10
1.1 What's new in Acronis Backup & Recovery 11.5 .....................................................................10
1.2 Acronis Backup & Recovery 11.5 components ........................................................................10
1.2.1 Agent for Windows ....................................................................................................................................... 10
1.2.2 Management Console ................................................................................................................................... 11
1.2.3 Bootable Media Builder ................................................................................................................................ 11
1.3 About the trial product version ...............................................................................................12
1.4 Supported file systems ............................................................................................................12
1.5 Technical Support ....................................................................................................................12
2 Getting started .................................................................................................................... 14
2.1 Using the management console ..............................................................................................15
2.1.1 "Navigation" pane ......................................................................................................................................... 16
2.1.2 Main area, views and action pages .............................................................................................................. 17
2.1.3 Console options ............................................................................................................................................. 20
3 Understanding Acronis Backup & Recovery 11.5 ................................................................... 23
3.1 Owners .....................................................................................................................................23
3.2 Credentials used in backup plans and tasks ............................................................................23
3.3 User privileges on a managed machine ...................................................................................25
3.4 List of Acronis services .............................................................................................................25
3.5 Full, incremental and differential backups ..............................................................................27
3.6 What does a disk or volume backup store?.............................................................................28
3.7 Backup and recovery of dynamic volumes (Windows) ............................................................29
3.8 Support for UEFI-based machines ...........................................................................................31
3.9 Compatibility with encryption software ..................................................................................31
3.10 Support for SNMP ....................................................................................................................32
4 Backup ................................................................................................................................ 34
4.1 Back up now .............................................................................................................................34
4.2 Creating a backup plan ............................................................................................................34
4.2.1 Selecting data to back up .............................................................................................................................. 36
4.2.2 Access credentials for source ....................................................................................................................... 37
4.2.3 Source files exclusion .................................................................................................................................... 37
4.2.4 Backup location selection ............................................................................................................................. 39
4.2.5 Access credentials for archive location ........................................................................................................ 41
4.2.6 Backup schemes ............................................................................................................................................ 42
4.2.7 Archive validation .......................................................................................................................................... 51
4.2.8 Backup plan's credentials ............................................................................................................................. 52
4.2.9 Label (Preserving machine properties in a backup) .................................................................................... 52
4.2.10 Why is the program asking for the password? ........................................................................................... 54
4.3 Simplified naming of backup files ............................................................................................54
4.3.1 The [DATE] variable ....................................................................................................................................... 55
4.3.2 Backup splitting and simplified file naming ................................................................................................. 56
4.3.3 Usage examples ............................................................................................................................................. 56