Manuals database logo
manualsdatabase
Your AI-powered manual search engine

ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER - manuals

BACKUP RECOVERY 10 ADVANCED SERVER - first page preview

BACKUP RECOVERY 10 ADVANCED SERVER -

Brand: ACRONIS | Category: Software
Table of contents
  1. Table Of Contents
  2. Main components
  3. License server, management server, and management console
  4. What you need to start
  5. Installation
  6. Backing up an individual machine
  7. Backing up volumes by using a backup policy
  8. What to read next
BACKUP RECOVERY 10 ADVANCED SERVER - first page preview

BACKUP RECOVERY 10 ADVANCED SERVER -

Brand: ACRONIS | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Getting started
  7. Using the management console
  8. operations with panes
  9. action pages
  10. Agent for Windows
  11. Agent for Linux
  12. Components for centralized management
  13. storage node
  14. Management Console
  15. Acronis Wake-On-LAN Proxy
  16. System requirements
  17. Technical Support
  18. Basic concepts
  19. User privileges on a managed machine
  20. Owners and credentials
  21. Full, incremental and differential backups
  22. GFS backup scheme
  23. Tower of Hanoi backup scheme
  24. Retention rules
  25. Backing up dynamic volumes (Windows)
  26. recovering dynamic volumes
  27. Backing up LVM volumes and MD devices (Linux)
  28. Backing up MD devices
  29. Saving the volume structure information
  30. Backing up hardware RAID arrays (Linux)
  31. Tape support
  32. Support for SNMP
  33. Proprietary Acronis technologies
  34. Acronis Startup Recovery Manager
  35. Acronis Active Restore
  36. Understanding centralized management
  37. Setting up centralized data protection in a heterogeneous network
  38. protecting the servers
  39. protecting the workstations
  40. Grouping the registered machines
  41. using custom groups
  42. Policies on machines and groups
  43. a policy on a machine or a group
  44. operations with a machine
  45. inheritance of policies
  46. Backup policy's state and statuses
  47. policy status on a machine
  48. policy deployment state on a group
  49. Deduplication
  50. how deduplication works
  51. when deduplication is most effective
  52. deduplication best practices
  53. deduplication restrictions
  54. Privileges for centralized management
  55. privileges for remote connection in linux
  56. acronis security groups
  57. management server administrator rights
  58. rights for acronis services
  59. secure communication
  60. client and server applications
  61. network port configuration
  62. Options
  63. Time-based alerts
  64. Management server options
  65. Event tracing
  66. Domain access credentials
  67. Online backup proxy
  68. Machine options
  69. Log cleanup rules
  70. Default backup and recovery options
  71. archive protection
  72. source files exclusion
  73. volume shadow copy service
  74. compression level
  75. backup performance
  76. network connection speed
  77. windows event log
  78. backup splitting
  79. media components
  80. error handling
  81. dual destination
  82. task failure handling
  83. additional settings
  84. Default recovery options
  85. recovery priority
  86. Vaults
  87. Centralized vaults
  88. Actions on centralized vaults
  89. creating a managed centralized vault
  90. vault encryption
  91. creating an unmanaged centralized vault
  92. Tape libraries
  93. rsm media pools
  94. getting started with a tape library
  95. actions on a tape library vault
  96. recovering from tape library
  97. tape rotation
  98. choosing a backup scheme
  99. case to analyze
  100. tape planning
  101. Personal vaults
  102. Actions on personal vaults
  103. Common operations
  104. Operations with backups
  105. Deleting archives and backups
  106. Filtering and sorting archives
  107. Scheduling
  108. Daily schedule
  109. Weekly schedule
  110. Monthly schedule
  111. At Windows Event Log event
  112. Advanced scheduling settings
  113. When an ADRM alert is received
  114. User is idle
  115. Fits time interval
  116. Time since last backup
  117. Direct management
  118. Backup plans and tasks
  119. understanding states and statuses
  120. task states
  121. task statuses
  122. working with backup plans and tasks
  123. filtering and sorting backup plans and tasks
  124. run backup plan
  125. backup plan details
  126. actions on log entries
  127. filtering and sorting log entries
  128. Creating a backup plan
  129. archive validation
  130. Why is the program asking for the password
  131. Items to back up
  132. Access credentials for source
  133. Exclusions
  134. Archive
  135. Simplified naming of backup files
  136. usage examples
  137. Access credentials for archive location
  138. Backup schemes
  139. simple scheme
  140. tower of hanoi scheme
  141. custom backup scheme
  142. Archive validation
  143. Recovering data
  144. when to recover
  145. Task credentials
  146. Data type
  147. Access credentials for location
  148. Destination selection
  149. disk destination
  150. mbr destination
  151. virtual machine settings
  152. file destination
  153. recovery exclusions
  154. Access credentials for destination
  155. How to convert a disk backup to a virtual machine
  156. Bootability troubleshooting
  157. Assembling MD devices for recovery (Linux)
  158. Recovering a vast number of files from a file backup
  159. Recovering the storage node
  160. Archive selection
  161. Backup selection
  162. When to validate
  163. Access credentials
  164. Volume selection
  165. Exporting archives and backups
  166. Location selection
  167. Acronis Secure Zone
  168. acronis secure zone disk
  169. Managing Acronis Secure Zone
  170. Bootable media
  171. How to create bootable media
  172. kernel parameters
  173. network settings
  174. network port
  175. Connecting to a machine booted from media
  176. setting up a display mode
  177. List of commands and utilities available in Linux-based bootable media
  178. Recovering MD devices and logical volumes
  179. creating the volume structure manually
  180. Acronis PXE Server
  181. setting up a machine to boot from pxe
  182. Disk management
  183. Choosing the operating system for disk management
  184. Disk operations
  185. basic disk cloning
  186. Volume operations
  187. create volume wizard
  188. select destination disks
  189. set the volume options
  190. delete volume
  191. change volume letter
  192. Pending operations
  193. Collecting system information
  194. Centralized management
  195. Backup policies
  196. backup policy deployment states
  197. actions on backup policies
  198. machines selection
  199. policy details
  200. Physical machines
  201. actions on machines
  202. applying policies
  203. importing machines from active directory
  204. synchronizing machines with a text file
  205. importing machines from a text file
  206. moving a machine to another group
  207. filtering and sorting machines
  208. actions on groups
  209. creating a custom static or dynamic group
  210. organizational unit criterion
  211. move one group to another
  212. Virtual machines
  213. virtual machines on a management server
  214. Storage nodes
  215. actions on storage nodes
  216. adding a storage node
  217. storage node details
  218. Tasks
  219. filtering and sorting tasks
  220. centralized log entry details
  221. Reporting
  222. report about the backup policies
  223. report about the backup plans
  224. report about the archives and backups
  225. report about the task activities
  226. Parameters set through administrative template
  227. connection parameters
  228. Parameters set through GUI
  229. Parameters set through Windows registry
  230. Creating a backup policy
  231. Policy credentials
  232. files to back up selection rules
  233. Backup scheme selection
  234. Online backup
  235. What data can I back up and recover
  236. How long will my backups be kept in the online storage
  237. Backup and recovery FAQ
  238. Initial Seeding FAQ
  239. what types of hard drive can i use for initial seeding
  240. how to package a hard drive for shipment
  241. how do i track an initial seeding order status
  242. Large Scale Recovery FAQ
  243. is large scale recovery a paid service
  244. Subscription lifecycle FAQ
  245. what happens when my subscription expires
  246. Where do I start
  247. Activating online backup subscriptions
  248. Reassigning an activated subscription
  249. Configuring proxy settings
  250. Limitations of the online storage
  251. Terminology reference
  252. Glossary
  253. backup operation
  254. backup scheme
  255. centralized backup plan
  256. deduplicating vault
  257. disk group
  258. dynamic disk
  259. dynamic volume
  260. full backup
  261. managed vault
  262. recovery point
  263. tower of hanoi
  264. unmanaged vault
  265. virtual machine
BACKUP RECOVERY 10 ADVANCED SERVER - first page preview

BACKUP RECOVERY 10 ADVANCED SERVER -

Brand: ACRONIS | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. acronis backup & recovery 10 overview
  6. Getting started
  7. Using the management console
  8. operations with panes
  9. action pages
  10. components for centralized management
  11. Agent for Windows
  12. Agent for Linux
  13. storage node
  14. license server
  15. Management Console
  16. Supported operating systems
  17. System requirements
  18. Technical support
  19. basic concepts
  20. User privileges on a managed machine
  21. Owners and credentials
  22. Full, incremental and differential backups
  23. GFS backup scheme
  24. Tower of Hanoi backup scheme
  25. Retention rules
  26. Backing up dynamic volumes (Windows)
  27. recovering dynamic volumes
  28. Backing up LVM volumes (Linux)
  29. Backing up RAID arrays (Linux)
  30. Tape support
  31. Using a single tape drive
  32. Proprietary Acronis technologies
  33. Acronis Startup Recovery Manager
  34. Acronis Active Restore
  35. usage scenarios
  36. Understanding centralized management
  37. Setting up centralized data protection in a heterogeneous network
  38. protecting the servers
  39. protecting the workstations
  40. Grouping the registered machines
  41. Policies on machines and groups
  42. a policy on a machine or a group
  43. operations with a machine
  44. inheritance of policies
  45. Backup policy's state and statuses
  46. policy status on a machine
  47. policy deployment state on a group
  48. Deduplication
  49. how deduplication works
  50. when deduplication is most effective
  51. deduplication ratio
  52. Privileges for centralized management
  53. remote connection
  54. privileges for remote connection in linux
  55. acronis security groups
  56. management server administrator rights
  57. user privileges on a storage node
  58. rights for acronis services
  59. secure communication
  60. configuring communication settings
  61. network port configuration
  62. ssl certificates
  63. Options
  64. Time-based alerts
  65. Management server options
  66. Event tracing
  67. Domain access credentials
  68. Machine options
  69. Machine management
  70. snmp notifications
  71. Log cleanup rules
  72. Customer Experience Program
  73. archive protection
  74. source files exclusion
  75. post-backup command
  76. pre-data capture command
  77. file-level backup snapshot
  78. compression level
  79. backup performance
  80. network connection speed
  81. windows event log
  82. fast incremental/differential backup
  83. media components
  84. dual destination
  85. task start conditions
  86. task failure handling
  87. additional settings
  88. Default recovery options
  89. pre-recovery command
  90. post-recovery command
  91. error handling
  92. Vaults
  93. Centralized vaults
  94. Actions on centralized vaults
  95. creating a managed centralized vault
  96. vault encryption
  97. attaching a managed vault
  98. Tape libraries
  99. rsm media pools
  100. getting started with a tape library
  101. tape library as a managed vault
  102. actions with archives on tapes in a library
  103. managing a tape library
  104. tape rotation
  105. criteria of the choice
  106. tape planning
  107. Personal vaults
  108. Actions on personal vaults
  109. creating a personal vault
  110. Common operations
  111. Operations with backups
  112. Deleting archives and backups
  113. Scheduling
  114. Daily schedule
  115. Weekly schedule
  116. Monthly schedule
  117. At Windows Event Log event
  118. Advanced scheduling settings
  119. Conditions
  120. User is idle
  121. Fits time interval
  122. User logged off
  123. Direct management
  124. Backup plans and tasks
  125. understanding states and statuses
  126. task states
  127. task statuses
  128. working with backup plans and tasks
  129. filtering and sorting backup plans and tasks
  130. run backup plan
  131. backup plan details
  132. actions on log entries
  133. filtering and sorting log entries
  134. Creating a backup plan
  135. archive validation
  136. Why is the program asking for the password
  137. Source type
  138. selecting disks and volumes
  139. Access credentials for source
  140. Archive
  141. Access credentials for archive location
  142. Backup schemes
  143. simple scheme
  144. tower of hanoi scheme
  145. custom backup scheme
  146. Archive validation
  147. Recovering data
  148. when to recover
  149. Task credentials
  150. Data type
  151. Access credentials for location
  152. Destination selection
  153. disk destination
  154. mbr destination
  155. volume properties
  156. virtual machine settings
  157. file destination
  158. Access credentials for destination
  159. Universal Restore
  160. How to convert a disk backup to a virtual machine
  161. Bootability troubleshooting
  162. Recovering MD devices (Linux)
  163. Recovering a vast number of files from a file backup
  164. Recovering the storage node
  165. Archive selection
  166. Backup selection
  167. When to validate
  168. Access credentials
  169. Managing mounted images
  170. Location selection
  171. Acronis Secure Zone
  172. acronis secure zone disk
  173. Managing Acronis Secure Zone
  174. deleting acronis secure zone
  175. Bootable media
  176. How to create bootable media
  177. kernel parameters
  178. network settings
  179. network port
  180. Connecting to a machine booted from media
  181. List of commands and utilities available in Linux-based bootable media
  182. Recovering MD devices and logical volumes
  183. creating the volume structure manually
  184. Acronis PXE Server
  185. acronis pxe server installation
  186. Disk management
  187. Running Acronis Disk Director Lite
  188. Disk operations
  189. basic disk cloning
  190. cloning method and advanced options
  191. Volume operations
  192. types of dynamic volumes
  193. select the type of volume being created
  194. set the volume size
  195. delete volume
  196. change volume letter
  197. Pending operations
  198. Collecting system information
  199. Centralized management
  200. Backup policies
  201. backup policy deployment states
  202. actions on backup policies
  203. machines selection
  204. policy details
  205. Physical machines
  206. actions on machines
  207. applying policies
  208. importing machines from active directory
  209. importing machines from a text file
  210. machine details
  211. filtering and sorting machines
  212. actions on groups
  213. organizational unit criterion
  214. editing custom groups
  215. Virtual machines
  216. virtual machines on a management server
  217. support for vcenter clusters
  218. Storage nodes
  219. actions on storage nodes
  220. adding a storage node
  221. Tasks
  222. actions on tasks
  223. filtering and sorting tasks
  224. centralized log entry details
  225. Reporting
  226. report about the machines
  227. report about the backup plans
  228. report about the archives and backups
  229. report about the vaults' statistics
  230. column selection
  231. Parameters set through administrative template
  232. connection parameters
  233. Parameters set through GUI
  234. Creating a backup policy
  235. Policy credentials
  236. Items to back up
  237. files to back up selection rules
  238. Exclusions
  239. Backup scheme selection
  240. Glossary
  241. agent-side cleanup
  242. backup plan (plan)
  243. backup scheme
  244. centralized backup plan
  245. deduplicating vault
  246. disk group
  247. dynamic disk
  248. dynamic volume
  249. gfs (grandfather-father-son)
  250. media builder
  251. recovery point
  252. storage node-side validation
  253. unmanaged vault
  254. Table Of Contents
  255. Table Of Contents
  256. Table Of Contents
  257. Table Of Contents
  258. Table Of Contents
  259. Table Of Contents
  260. Table Of Contents
  261. Table Of Contents
ACRONIS categories
More ACRONIS categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine