User guide

22 Copyright © Acronis, Inc., 2000-2011
1. In the Plan parameters (or Task parameters) section, click Show plan's credentials, comments,
label (or Show task credentials).
2. Click Plan's (Task) credentials.
3. Enter the credentials under which the plan (task) will run.
Scheduled or postponed start
The plan (task) credentials are mandatory. If you skip the credentials step, you will be asked for
credentials after finishing the plan (task) creation.
Why does the program compel me to specify credentials?
A scheduled or postponed task has to run anyway, regardless if any user is logged on or not (for
example, the system is at the Windows "Welcome" screen) or a user other than the task owner is
logged on. It is sufficient that the machine be on (that is, not in standby or hibernate) at the
scheduled task start time. That's why the Acronis scheduler needs the explicitly specified credentials
to be able to start the task.
3.2 User privileges on a managed machine
When managing a machine running Windows, the scope of a user's management rights depends on
the user's privileges on the machine.
Regular users
A regular user, such as a member of the Users group, has the following management rights:
Perform file-level backup and recovery of the files that the user has permissions to accessbut
without using a file-level backup snapshot.
Create backup plans and tasks and manage them.
Viewbut not managebackup plans and tasks created by other users.
View the local event log.
Administrative users
A user who has administrative privileges on the machine, such as a member of the Administrators or
Backup Operators group, additionally has the following management rights:
Back up and recover the entire machine or any data on the machine, with or without using a disk
snapshot.
Members of the Administrators group also can:
View and manage backup plans and tasks owned by any user on the machine.
3.3 Full, incremental and differential backups
Acronis Backup & Recovery 11 provides the capability to use popular backup schemes, such as
Grandfather-Father-Son and Tower of Hanoi, as well as to create custom backup schemes. All backup
schemes are based on full, incremental and differential backup methods. The term "scheme" in fact
denotes the algorithm of applying these methods plus the algorithm of the archive cleanup.
Comparing backup methods with each other does not make much sense because the methods work
as a team in a backup scheme. Each method should play its specific role according to its advantages.
A competent backup scheme will benefit from the advantages of all backup methods and lessen the