ACRONIS Backup & Recovery 10 Server for Windows User Manual page 4

Hide thumbs Also See for Backup & Recovery 10 Server for Windows:
Table of Contents

Advertisement

4.
Vaults .................................................................................................................. 80
4.1.
Personal vaults .................................................................................................................. 81
4.1.1.
Working with the "Personal vault" view .................................................................................................. 81
4.1.2.
Actions on personal vaults ........................................................................................................................ 82
4.2.
Common operations ......................................................................................................... 84
4.2.1.
Operations with archives stored in a vault .............................................................................................. 84
4.2.2.
Operations with backups .......................................................................................................................... 85
4.2.3.
Deleting archives and backups ................................................................................................................. 86
4.2.4.
Filtering and sorting archives .................................................................................................................... 86
5.
Scheduling ............................................................................................................ 87
5.1.
Daily schedule ................................................................................................................... 88
5.2.
Weekly schedule ............................................................................................................... 90
5.3.
Monthly schedule .............................................................................................................. 93
5.4.
At Windows Event Log event ............................................................................................ 95
5.5.
Conditions ......................................................................................................................... 97
5.5.1.
User is idle .................................................................................................................................................. 98
5.5.2.
Location's host is available ........................................................................................................................ 98
5.5.3.
Fits time interval ........................................................................................................................................ 98
5.5.4.
User logged off ........................................................................................................................................... 99
5.5.5.
Time since last backup ............................................................................................................................. 100
6.
Direct management ............................................................................................ 101
6.1.
Administering a managed machine ................................................................................ 101
6.1.1.
Dashboard ................................................................................................................................................ 101
6.1.2.
Backup plans and tasks ............................................................................................................................ 103
6.1.3.
Log ............................................................................................................................................................. 114
6.2.
Creating a backup plan .................................................................................................... 117
6.2.1.
Why is the program asking for the password? ...................................................................................... 119
6.2.2.
Backup plan's credentials ........................................................................................................................ 119
6.2.3.
Source type ............................................................................................................................................... 120
6.2.4.
Items to back up....................................................................................................................................... 120
6.2.5.
Access credentials for source .................................................................................................................. 122
6.2.6.
Exclusions ................................................................................................................................................. 122
6.2.7.
Archive ...................................................................................................................................................... 123
6.2.8.
Access credentials for archive location .................................................................................................. 124
6.2.9.
Backup schemes ....................................................................................................................................... 125
6.2.10.
Archive validation .................................................................................................................................... 135
6.2.11.
Setting up regular conversion to a virtual machine .............................................................................. 135
6.3.
Recovering data............................................................................................................... 137
6.3.1.
Task credentials........................................................................................................................................ 139
6.3.2.
Archive selection ...................................................................................................................................... 140
6.3.3.
Data type .................................................................................................................................................. 140
6.3.4.
Content selection ..................................................................................................................................... 141
6.3.5.
Access credentials for location ............................................................................................................... 142
6.3.6.
Destination selection ............................................................................................................................... 142
6.3.7.
Access credentials for destination .......................................................................................................... 149
6.3.8.
When to recover ...................................................................................................................................... 150
6.3.9.
Universal Restore ..................................................................................................................................... 150
6.3.10.
How to convert a disk backup to a virtual machine .............................................................................. 151
6.3.11.
Bootability troubleshooting .................................................................................................................... 153
6.3.12.
Recovering a vast number of files from a file backup ........................................................................... 156

Advertisement

Table of Contents
loading

Table of Contents