ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition User Manual page 5

Hide thumbs Also See for Backup & Recovery 10 Advanced Server Virtual Edition:
Table of Contents

Advertisement

5.6.5
Time since last backup ............................................................................................................................ 179
6
Direct management ............................................................................................................. 181
6.1
Administering a managed machine ...................................................................................... 181
6.1.1
Dashboard ............................................................................................................................................... 181
6.1.2
Backup plans and tasks ........................................................................................................................... 183
6.1.3
Log ............................................................................................................................................................ 194
6.2
Creating a backup plan ......................................................................................................... 196
6.2.1
Why is the program asking for the password? ....................................................................................... 198
6.2.2
Backup plan's credentials ........................................................................................................................ 198
6.2.3
Source type .............................................................................................................................................. 199
6.2.4
Items to back up ...................................................................................................................................... 200
6.2.5
Access credentials for source .................................................................................................................. 202
6.2.6
Exclusions ................................................................................................................................................. 202
6.2.7
Archive ..................................................................................................................................................... 203
6.2.8
Access credentials for archive location ................................................................................................... 205
6.2.9
Backup schemes ...................................................................................................................................... 205
6.2.10
Archive validation .................................................................................................................................... 214
6.2.11
Setting up regular conversion to a virtual machine ............................................................................... 215
6.3
Recovering data .................................................................................................................... 216
6.3.1
Task credentials ....................................................................................................................................... 218
6.3.2
Archive selection ..................................................................................................................................... 219
6.3.3
Data type.................................................................................................................................................. 220
6.3.4
Content selection .................................................................................................................................... 220
6.3.5
Access credentials for location ................................................................................................................ 221
6.3.6
Destination selection ............................................................................................................................... 221
6.3.7
Access credentials for destination .......................................................................................................... 228
6.3.8
When to recover ...................................................................................................................................... 228
6.3.9
Universal Restore .................................................................................................................................... 228
6.3.10
How to convert a disk backup to a virtual machine ............................................................................... 230
6.3.11
Bootability troubleshooting .................................................................................................................... 231
6.3.12
Recovering MD devices (Linux) ............................................................................................................... 234
6.3.13
Recovering a vast number of files from a file backup ............................................................................ 234
6.3.14
Recovering the storage node .................................................................................................................. 235
6.4
Validating vaults, archives and backups ............................................................................... 235
6.4.1
Task credentials ....................................................................................................................................... 237
6.4.2
Archive selection ..................................................................................................................................... 237
6.4.3
Backup selection ...................................................................................................................................... 238
6.4.4
Location selection .................................................................................................................................... 238
6.4.5
Access credentials for source .................................................................................................................. 239
6.4.6
When to validate ..................................................................................................................................... 239
6.5
Mounting an image ............................................................................................................... 239
6.5.1
Archive selection ..................................................................................................................................... 240
6.5.2
Backup selection ...................................................................................................................................... 241
6.5.3
Access credentials ................................................................................................................................... 241
6.5.4
Volume selection ..................................................................................................................................... 242
6.6
Managing mounted images .................................................................................................. 242
6.7
Exporting archives and backups ........................................................................................... 242
6.7.1
Task credentials ....................................................................................................................................... 245
6.7.2
Archive selection ..................................................................................................................................... 245
6.7.3
Backup selection ...................................................................................................................................... 246
6.7.4
Access credentials for source .................................................................................................................. 246
6.7.5
Location selection .................................................................................................................................... 247
6.7.6
Access credentials for destination .......................................................................................................... 248

Advertisement

Table of Contents
loading

Table of Contents