6.8.1
Creating Acronis Secure Zone ................................................................................................................. 247
6.8.2
Managing Acronis Secure Zone ............................................................................................................... 249
6.9
6.10 Bootable media ..................................................................................................................... 251
6.10.1
How to create bootable media ............................................................................................................... 252
6.10.2
6.10.3
Working under bootable media .............................................................................................................. 260
6.10.4
6.10.5
6.10.6
Acronis PXE Server ................................................................................................................................... 266
6.11 Disk management ................................................................................................................. 268
6.11.1
Basic precautions ..................................................................................................................................... 268
6.11.2
6.11.3
6.11.4
"Disk management" view ........................................................................................................................ 269
6.11.5
Disk operations ........................................................................................................................................ 270
6.11.6
Volume operations .................................................................................................................................. 276
6.11.7
Pending operations ................................................................................................................................. 282
7
Centralized management ..................................................................................................... 284
7.1
7.1.1
Dashboard ............................................................................................................................................... 284
7.1.2
Backup policies ........................................................................................................................................ 286
7.1.3
Physical machines .................................................................................................................................... 291
7.1.4
Virtual machines ...................................................................................................................................... 308
7.1.5
Storage nodes .......................................................................................................................................... 313
7.1.6
Tasks ......................................................................................................................................................... 317
7.1.7
Log ............................................................................................................................................................ 319
7.1.8
Reporting ................................................................................................................................................. 323
7.2
7.2.1
7.2.2
Parameters set through GUI ................................................................................................................... 343
7.2.3
7.3
Creating a backup policy ....................................................................................................... 345
7.3.1
Policy credentials ..................................................................................................................................... 347
7.3.2
Items to back up ...................................................................................................................................... 348
7.3.3
Access credentials for source .................................................................................................................. 353
7.3.4
Exclusions ................................................................................................................................................. 353
7.3.5
Archive ..................................................................................................................................................... 354
7.3.6
7.3.7
Backup scheme selection ........................................................................................................................ 356
7.3.8
Archive validation .................................................................................................................................... 366
8
Online backup ..................................................................................................................... 366
8.1
8.1.1
8.1.2
8.1.3
8.1.4
How to secure my data? ......................................................................................................................... 368
8.1.5
8.1.6
Backup and recovery FAQ ....................................................................................................................... 369
8.1.7
Initial Seeding FAQ ................................................................................................................................... 370
8.1.8
Large Scale Recovery FAQ ....................................................................................................................... 375