Datasheet
Table Of Contents
- Chapter 1. Introduction
- 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users
- 1.2 Acronis True Image Echo Enterprise Server components
- 1.3 New in Acronis True Image Echo Enterprise Server
- 1.4 Supported file systems and storage media
- 1.5 License policy
- 1.6 Technical support
- Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
- 2.1 System requirements
- 2.2 Security parameters
- 2.3 Installing Acronis True Image Echo Enterprise Server components
- 2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis True Image Agent for Windows
- 2.3.2 Installation of Acronis True Image Agent for Linux
- 2.3.3 Installation of Acronis Group Server
- 2.3.4 Acronis Backup Server installation and setup
- 2.3.5 Acronis Universal Restore installation
- 2.4 Extracting Acronis True Image Echo Enterprise Server components
- 2.5 Running Acronis True Image Echo Enterprise Server components
- 2.6 Removing Acronis True Image Echo Enterprise Server components
- Chapter 3. General information and proprietary Acronis technologies
- 3.1 The difference between file archives and disk/partition images
- 3.2 Full, incremental and differential backups
- 3.3 Acronis Secure Zone®
- 3.4 Acronis Startup Recovery Manager
- 3.5 Acronis Backup Server
- 3.6 Acronis Snap Restore
- 3.7 Acronis Universal Restore
- 3.8 Backing up to tape libraries and tape drives
- 3.9 Viewing disk and partition information
- Chapter 4. Using Acronis True Image Management Console
- Chapter 5. Using Acronis True Image Echo Enterprise Server (local version)
- Chapter 6. Creating backup archives
- 6.1 Backing up files and folders (file backup)
- 6.2 Backing up disks and partitions (image backup)
- 6.3 Setting backup options
- 6.3.1 Archive protection
- 6.3.2 Source files exclusion
- 6.3.3 Pre/post commands
- 6.3.4 Database support
- 6.3.5 Compression level
- 6.3.6 Backup performance
- 6.3.7 Fast incremental/differential backup
- 6.3.8 Archive splitting
- 6.3.9 File-level security settings
- 6.3.10 Media components
- 6.3.11 Error handling
- 6.3.12 Dual destination backup
- 6.3.13 Wake On LAN
- 6.3.14 Additional settings
- Chapter 7. Restoring the backup data
- 7.1 Considerations before recovery
- 7.2 Restoring files and folders from file archives
- 7.3 Restoring disks/partitions or files from images
- 7.3.1 Starting the Restore Data Wizard
- 7.3.2 Archive selection
- 7.3.3 Restoration type selection
- 7.3.4 Selecting a disk/partition to restore
- 7.3.5 Selecting a target disk/partition
- 7.3.6 Changing the restored partition type
- 7.3.7 Changing the restored partition file system
- 7.3.8 Changing the restored partition size and location
- 7.3.9 Assigning a letter to the restored partition
- 7.3.10 Restoring several disks or partitions at once
- 7.3.11 Using Acronis Universal Restore
- 7.3.12 Setting restore options
- 7.3.13 Restoration summary and executing restoration
- 7.4 Setting restore options
- 7.5 Creating dynamic disks and volumes
- Chapter 8. Scheduling tasks
- Chapter 9. Managing the Acronis Secure Zone
- Chapter 10. Creating bootable media
- Chapter 11. Operations with archives
- Chapter 12. Notifications and event tracing
- Chapter 13. Working with a virtual environment
- Chapter 14. Transferring the system to a new disk
- 14.1 General information
- 14.2 Security
- 14.3 Executing transfers
- 14.3.1 Selecting Clone mode
- 14.3.2 Selecting source disk
- 14.3.3 Selecting destination disk
- 14.3.4 Partitioned destination disk
- 14.3.5 Old and new disk partition layout
- 14.3.6 Old disk data
- 14.3.7 Destroying the old disk data
- 14.3.8 Selecting partition transfer method
- 14.3.9 Partitioning the old disk
- 14.3.10 Old and new disk partition layouts
- 14.3.11 Cloning summary
- 14.4 Cloning with manual partitioning
- Chapter 15. Adding a new hard disk
- Chapter 16. Command-line mode and scripting

For detailed information about Windows GPO Editor please see:
http://msdn2.microsoft.com/en-us/library/aa374163.aspx
For detailed information about Group Policies please see:
http://msdn2.microsoft.com/en-us/library/aa374177.aspx
The Acronis Administrative Template contains the following settings.
Encryption Options
• Server Requires Encryption
This option defines the server behavior in case the client does not support encryption.
When enabled, connection to the client will be terminated. When disabled, the client will
be allowed to establish non-encrypted connection.
• Client Requires Encryption
When connecting to server applications, the Acronis client applications always attempt to
establish an encrypted connection. The Client Requires Encryption option defines the
client behavior in case the server does not support encryption. When disabled, the non-
encrypted connection will be established. When enabled, the connection will be
terminated.
After applying the template or editing the encryption options, you should restart the
Remote Agent(s).
2.3 Installing Acronis True Image Echo Enterprise Server components
To install Acronis True Image Echo Enterprise Server components, run the Acronis True
Image Echo Enterprise Server setup file.
If you have the trial version of Acronis True Image Echo Enterprise Server installed on
your system, you must uninstall it before installing the commercial version of the product.
Select the program to install and follow instructions on the screen.
Copyright © Acronis, Inc., 2000-2007 17










