Datasheet
Table Of Contents
- Chapter 1. Introduction
- 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users
- 1.2 Acronis True Image Echo Enterprise Server components
- 1.3 New in Acronis True Image Echo Enterprise Server
- 1.4 Supported file systems and storage media
- 1.5 License policy
- 1.6 Technical support
- Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
- 2.1 System requirements
- 2.2 Security parameters
- 2.3 Installing Acronis True Image Echo Enterprise Server components
- 2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis True Image Agent for Windows
- 2.3.2 Installation of Acronis True Image Agent for Linux
- 2.3.3 Installation of Acronis Group Server
- 2.3.4 Acronis Backup Server installation and setup
- 2.3.5 Acronis Universal Restore installation
- 2.4 Extracting Acronis True Image Echo Enterprise Server components
- 2.5 Running Acronis True Image Echo Enterprise Server components
- 2.6 Removing Acronis True Image Echo Enterprise Server components
- Chapter 3. General information and proprietary Acronis technologies
- 3.1 The difference between file archives and disk/partition images
- 3.2 Full, incremental and differential backups
- 3.3 Acronis Secure Zone®
- 3.4 Acronis Startup Recovery Manager
- 3.5 Acronis Backup Server
- 3.6 Acronis Snap Restore
- 3.7 Acronis Universal Restore
- 3.8 Backing up to tape libraries and tape drives
- 3.9 Viewing disk and partition information
- Chapter 4. Using Acronis True Image Management Console
- Chapter 5. Using Acronis True Image Echo Enterprise Server (local version)
- Chapter 6. Creating backup archives
- 6.1 Backing up files and folders (file backup)
- 6.2 Backing up disks and partitions (image backup)
- 6.3 Setting backup options
- 6.3.1 Archive protection
- 6.3.2 Source files exclusion
- 6.3.3 Pre/post commands
- 6.3.4 Database support
- 6.3.5 Compression level
- 6.3.6 Backup performance
- 6.3.7 Fast incremental/differential backup
- 6.3.8 Archive splitting
- 6.3.9 File-level security settings
- 6.3.10 Media components
- 6.3.11 Error handling
- 6.3.12 Dual destination backup
- 6.3.13 Wake On LAN
- 6.3.14 Additional settings
- Chapter 7. Restoring the backup data
- 7.1 Considerations before recovery
- 7.2 Restoring files and folders from file archives
- 7.3 Restoring disks/partitions or files from images
- 7.3.1 Starting the Restore Data Wizard
- 7.3.2 Archive selection
- 7.3.3 Restoration type selection
- 7.3.4 Selecting a disk/partition to restore
- 7.3.5 Selecting a target disk/partition
- 7.3.6 Changing the restored partition type
- 7.3.7 Changing the restored partition file system
- 7.3.8 Changing the restored partition size and location
- 7.3.9 Assigning a letter to the restored partition
- 7.3.10 Restoring several disks or partitions at once
- 7.3.11 Using Acronis Universal Restore
- 7.3.12 Setting restore options
- 7.3.13 Restoration summary and executing restoration
- 7.4 Setting restore options
- 7.5 Creating dynamic disks and volumes
- Chapter 8. Scheduling tasks
- Chapter 9. Managing the Acronis Secure Zone
- Chapter 10. Creating bootable media
- Chapter 11. Operations with archives
- Chapter 12. Notifications and event tracing
- Chapter 13. Working with a virtual environment
- Chapter 14. Transferring the system to a new disk
- 14.1 General information
- 14.2 Security
- 14.3 Executing transfers
- 14.3.1 Selecting Clone mode
- 14.3.2 Selecting source disk
- 14.3.3 Selecting destination disk
- 14.3.4 Partitioned destination disk
- 14.3.5 Old and new disk partition layout
- 14.3.6 Old disk data
- 14.3.7 Destroying the old disk data
- 14.3.8 Selecting partition transfer method
- 14.3.9 Partitioning the old disk
- 14.3.10 Old and new disk partition layouts
- 14.3.11 Cloning summary
- 14.4 Cloning with manual partitioning
- Chapter 15. Adding a new hard disk
- Chapter 16. Command-line mode and scripting

Chapter 12. Notifications and event tracing
Sometimes a backup or restore procedure can last for 30 minutes or more. Acronis True
Image Echo Enterprise Server can notify you when it is finished through the WinPopup
service or e-mail. The program can also duplicate messages issued during the operation
or send you the full operation log after operation completion.
By default all notifications are disabled.
12.1 Email notification
To set up e-mail notification, select Tools -> Options -> Notifications -> E-mail:
Provide the e-mail address to which notifications will be sent. You can enter several
addresses separated by semicolons.
Provide the outgoing SMTP server name. A user name and a password might also be
needed if the SMTP server requires authentication.
Some Internet service providers require authentication on the incoming mail server before
being allowed to send anything. If this is your case, click Advanced and tick off Log on
to incoming mail server and provide the server name.
Filling up the From and Subject fields will help the e-mail client program filter
notifications to the appropriate folder. If the From field is left blank, messages will be
constructed as if they are from the destination address.
Below, in this window, you can choose whether you want to get notifications:
- when the operation is completed successfully (check Add full log to the notification
to add the full operation log to the message)
- when the operation failed (check Add full log to the notification to add the full
operation log to the message)
- during the operation when user interaction is required.
12.2 WinPopup notification
To set up WinPopup notification:
Copyright © Acronis, Inc., 2000-2007 115










