Datasheet
Table Of Contents
- Chapter 1. Introduction
- 1.1 Acronis® True Image Echo Enterprise Server – a complete solution for corporate users
- 1.2 Acronis True Image Echo Enterprise Server components
- 1.3 New in Acronis True Image Echo Enterprise Server
- 1.4 Supported file systems and storage media
- 1.5 License policy
- 1.6 Technical support
- Chapter 2. Acronis True Image Echo Enterprise Server installation and startup
- 2.1 System requirements
- 2.2 Security parameters
- 2.3 Installing Acronis True Image Echo Enterprise Server components
- 2.3.1 Installation of Acronis True Image Echo Enterprise Server local version and Acronis True Image Agent for Windows
- 2.3.2 Installation of Acronis True Image Agent for Linux
- 2.3.3 Installation of Acronis Group Server
- 2.3.4 Acronis Backup Server installation and setup
- 2.3.5 Acronis Universal Restore installation
- 2.4 Extracting Acronis True Image Echo Enterprise Server components
- 2.5 Running Acronis True Image Echo Enterprise Server components
- 2.6 Removing Acronis True Image Echo Enterprise Server components
- Chapter 3. General information and proprietary Acronis technologies
- 3.1 The difference between file archives and disk/partition images
- 3.2 Full, incremental and differential backups
- 3.3 Acronis Secure Zone®
- 3.4 Acronis Startup Recovery Manager
- 3.5 Acronis Backup Server
- 3.6 Acronis Snap Restore
- 3.7 Acronis Universal Restore
- 3.8 Backing up to tape libraries and tape drives
- 3.9 Viewing disk and partition information
- Chapter 4. Using Acronis True Image Management Console
- Chapter 5. Using Acronis True Image Echo Enterprise Server (local version)
- Chapter 6. Creating backup archives
- 6.1 Backing up files and folders (file backup)
- 6.2 Backing up disks and partitions (image backup)
- 6.3 Setting backup options
- 6.3.1 Archive protection
- 6.3.2 Source files exclusion
- 6.3.3 Pre/post commands
- 6.3.4 Database support
- 6.3.5 Compression level
- 6.3.6 Backup performance
- 6.3.7 Fast incremental/differential backup
- 6.3.8 Archive splitting
- 6.3.9 File-level security settings
- 6.3.10 Media components
- 6.3.11 Error handling
- 6.3.12 Dual destination backup
- 6.3.13 Wake On LAN
- 6.3.14 Additional settings
- Chapter 7. Restoring the backup data
- 7.1 Considerations before recovery
- 7.2 Restoring files and folders from file archives
- 7.3 Restoring disks/partitions or files from images
- 7.3.1 Starting the Restore Data Wizard
- 7.3.2 Archive selection
- 7.3.3 Restoration type selection
- 7.3.4 Selecting a disk/partition to restore
- 7.3.5 Selecting a target disk/partition
- 7.3.6 Changing the restored partition type
- 7.3.7 Changing the restored partition file system
- 7.3.8 Changing the restored partition size and location
- 7.3.9 Assigning a letter to the restored partition
- 7.3.10 Restoring several disks or partitions at once
- 7.3.11 Using Acronis Universal Restore
- 7.3.12 Setting restore options
- 7.3.13 Restoration summary and executing restoration
- 7.4 Setting restore options
- 7.5 Creating dynamic disks and volumes
- Chapter 8. Scheduling tasks
- Chapter 9. Managing the Acronis Secure Zone
- Chapter 10. Creating bootable media
- Chapter 11. Operations with archives
- Chapter 12. Notifications and event tracing
- Chapter 13. Working with a virtual environment
- Chapter 14. Transferring the system to a new disk
- 14.1 General information
- 14.2 Security
- 14.3 Executing transfers
- 14.3.1 Selecting Clone mode
- 14.3.2 Selecting source disk
- 14.3.3 Selecting destination disk
- 14.3.4 Partitioned destination disk
- 14.3.5 Old and new disk partition layout
- 14.3.6 Old disk data
- 14.3.7 Destroying the old disk data
- 14.3.8 Selecting partition transfer method
- 14.3.9 Partitioning the old disk
- 14.3.10 Old and new disk partition layouts
- 14.3.11 Cloning summary
- 14.4 Cloning with manual partitioning
- Chapter 15. Adding a new hard disk
- Chapter 16. Command-line mode and scripting

6.3.1 Archive protection
Password
The preset is no password.
An archive can be protected with a password. To protect the archive data from being
accessed by anybody except you, enter a password and its confirmation into the text
fields. A password should consist of at least eight symbols and contain both letters (in the
upper and lower cases preferably) and numbers to make it more difficult to guess.
If you try to restore data from a password-protected archive, or append an
incremental/differential backup to such an archive, Acronis True Image Echo Enterprise
Server will ask for the password in a special window, allowing access only to authorized
users.
Passwords cannot be set for archives created in the Acronis Secure Zone. To protect such
archives, set a password for the zone itself.
Encryption
The preset is 128 bit.
Once the password has been set, you can choose to encrypt the backup for advanced
security with industry-standard AES cryptographic algorithm. The password is used to
generate a key which may differ in length. There are 4 choices: no encryption, 128, 192
and 256-bit encryption. The more the key size, the longer time to cipher and the greater
is your data security.
6.3.2 Source files exclusion
By default, all files from the selected folders will be included in the archive.
You can set default filters for the specific types of files you do not wish to back up. For
example, you may want hidden and system files and folders, as well as files with .~,
.tmp and .bak extensions, not to be stored in the archive.
You can also apply custom filters, using the common Windows masking rules. For
example, to exclude all files with extension .exe, add *.exe. My???.exe will exclude all
.exe files with names consisting of five symbols and starting with “my”.
68 Copyright © Acronis, Inc., 2000-2007










