Datasheet
Table Of Contents
- Chapter 1. Introduction
- 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users
- 1.2 Acronis True Image Echo Enterprise Server components
- 1.3 New in Acronis True Image Echo Enterprise Server
- 1.4 Supported file systems and storage media
- 1.5 License policy
- 1.6 Technical support
- Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
- 2.1 System requirements
- 2.2 Security parameters
- 2.3 Installing Acronis True Image Echo Enterprise Server components
- 2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis True Image Agent for Windows
- 2.3.2 Installation of Acronis True Image Agent for Linux
- 2.3.3 Installation of Acronis Group Server
- 2.3.4 Acronis Backup Server installation and setup
- 2.3.5 Acronis Universal Restore installation
- 2.4 Extracting Acronis True Image Echo Enterprise Server components
- 2.5 Running Acronis True Image Echo Enterprise Server components
- 2.6 Removing Acronis True Image Echo Enterprise Server components
- Chapter 3. General information and proprietary Acronis technologies
- 3.1 The difference between file archives and disk/partition images
- 3.2 Full, incremental and differential backups
- 3.3 Acronis Secure Zone®
- 3.4 Acronis Startup Recovery Manager
- 3.5 Acronis Backup Server
- 3.6 Acronis Snap Restore
- 3.7 Acronis Universal Restore
- 3.8 Backing up to tape libraries and tape drives
- 3.9 Viewing disk and partition information
- Chapter 4. Using Acronis True Image Management Console
- Chapter 5. Using Acronis True Image Echo Enterprise Server (local version)
- Chapter 6. Creating backup archives
- 6.1 Backing up files and folders (file backup)
- 6.2 Backing up disks and partitions (image backup)
- 6.3 Setting backup options
- 6.3.1 Archive protection
- 6.3.2 Source files exclusion
- 6.3.3 Pre/post commands
- 6.3.4 Database support
- 6.3.5 Compression level
- 6.3.6 Backup performance
- 6.3.7 Fast incremental/differential backup
- 6.3.8 Archive splitting
- 6.3.9 File-level security settings
- 6.3.10 Media components
- 6.3.11 Error handling
- 6.3.12 Dual destination backup
- 6.3.13 Wake On LAN
- 6.3.14 Additional settings
- Chapter 7. Restoring the backup data
- 7.1 Considerations before recovery
- 7.2 Restoring files and folders from file archives
- 7.3 Restoring disks/partitions or files from images
- 7.3.1 Starting the Restore Data Wizard
- 7.3.2 Archive selection
- 7.3.3 Restoration type selection
- 7.3.4 Selecting a disk/partition to restore
- 7.3.5 Selecting a target disk/partition
- 7.3.6 Changing the restored partition type
- 7.3.7 Changing the restored partition file system
- 7.3.8 Changing the restored partition size and location
- 7.3.9 Assigning a letter to the restored partition
- 7.3.10 Restoring several disks or partitions at once
- 7.3.11 Using Acronis Universal Restore
- 7.3.12 Setting restore options
- 7.3.13 Restoration summary and executing restoration
- 7.4 Setting restore options
- 7.5 Creating dynamic disks and volumes
- Chapter 8. Scheduling tasks
- Chapter 9. Managing the Acronis Secure Zone
- Chapter 10. Creating bootable media
- Chapter 11. Operations with archives
- Chapter 12. Notifications and event tracing
- Chapter 13. Working with a virtual environment
- Chapter 14. Transferring the system to a new disk
- 14.1 General information
- 14.2 Security
- 14.3 Executing transfers
- 14.3.1 Selecting Clone mode
- 14.3.2 Selecting source disk
- 14.3.3 Selecting destination disk
- 14.3.4 Partitioned destination disk
- 14.3.5 Old and new disk partition layout
- 14.3.6 Old disk data
- 14.3.7 Destroying the old disk data
- 14.3.8 Selecting partition transfer method
- 14.3.9 Partitioning the old disk
- 14.3.10 Old and new disk partition layouts
- 14.3.11 Cloning summary
- 14.4 Cloning with manual partitioning
- Chapter 15. Adding a new hard disk
- Chapter 16. Command-line mode and scripting

2.2.3 Encrypted communication
Acronis True Image Echo Enterprise Server provides capability to secure all data
transferred between Acronis components within local net and through DMZ, including the
backup stream.
Encryption starts on the first (earliest) stage of connection attempt, so all data transferred
on the next steps (including data required for client authentication) is encrypted.
Once Acronis True Image Echo Enterprise Server components are installed, encrypted
communication between the components is enabled automatically.
The earlier versions of Acronis True Image Enterprise Server did not support encrypted
communication, therefore connection to such components, if they present on the
network, will not be encrypted. You have an option to completely disable non-encrypted
communication with some or all Acronis True Image Echo Enterprise Server components.
In this case, the components will not be able to communicate with components of earlier
versions. For how to disable non-encrypted communication, see the next section.
The earlier versions of Acronis True Image Management Console cannot communicate
with Acronis True Image Echo Enterprise Server agents. The console must be upgraded
to the Acronis True Image Echo Enterprise Server console.
Encryption is provided with Secure Socket Layer mechanism. There are two stakeholders
of the encryption operation:
• Client application – the application that tries to establish (initiates) connection. This
could be the Acronis True Image Management Console or Acronis Group Server.
Acronis True Image Echo Enterprise Server local version can also be a client when it
performs backup to Acronis Backup Server.
• Server application – the application to which the client tries to connect. This could
be Acronis True Image Agent, Acronis Group Server, Acronis Backup Server.
2.2.4 Security parameters in Acronis Administrative Template
As stated above, encryption generally does not require setting up. However, connection to
Acronis components of earlier versions will not be encrypted. To completely disable non-
encrypted communication with some or all Acronis True Image Echo Enterprise Server
components, use the Administrative Template, provided by Acronis.
Through the Microsoft Group Policy mechanism, the template can be applied to a single
computer as well as to a domain.
How to apply Acronis Administrative Template
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc).
2. Open the Group Policy object you want to edit, and in the console tree right-click
Administrative Templates.
3. Click Add/Remove Templates.
4. Click Add.
5. Browse to the Acronis Administrative Template
(\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open.
6. Once the template is added, open it and edit the desired settings.
16 Copyright © Acronis, Inc., 2000-2007










