Manuals database logo
manualsdatabase
Your AI-powered manual search engine

ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION manuals

BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION first page preview

BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION

Brand: ACRONIS | Category: Software
Table of contents
  1. Table Of Contents
  2. Main components
  3. License server, management server, and management console
  4. What you need to start
  5. Installation
  6. Backing up an individual machine
  7. Backing up volumes by using a backup policy
  8. What to read next
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION first page preview

BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION

Brand: ACRONIS | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Getting started
  7. Using the management console
  8. operations with panes
  9. action pages
  10. components for centralized management
  11. Agent for Windows
  12. Components for centralized management
  13. storage node
  14. Management Console
  15. Acronis Wake-On-LAN Proxy
  16. System requirements
  17. Technical Support
  18. basic concepts
  19. Full, incremental and differential backups
  20. User privileges on a managed machine
  21. GFS backup scheme
  22. Tower of Hanoi backup scheme
  23. Retention rules
  24. Backing up dynamic volumes (Windows)
  25. recovering dynamic volumes
  26. Tape support
  27. Using a single tape drive
  28. Support for SNMP
  29. Proprietary Acronis technologies
  30. Acronis Startup Recovery Manager
  31. Acronis Active Restore
  32. how it works
  33. Understanding centralized management
  34. Setting up centralized data protection in a heterogeneous network
  35. protecting the servers
  36. protecting the workstations
  37. Grouping the registered machines
  38. a policy on a machine or a group
  39. inheritance of policies
  40. Backup policy's state and statuses
  41. policy status on a machine
  42. policy deployment state on a group
  43. Deduplication
  44. how deduplication works
  45. when deduplication is most effective
  46. deduplication best practices
  47. deduplication restrictions
  48. Privileges for centralized management
  49. acronis security groups
  50. user privileges on a storage node
  51. management server administrator rights
  52. secure communication
  53. client and server applications
  54. network port configuration
  55. Options
  56. Time-based alerts
  57. Management server options
  58. Event tracing
  59. Domain access credentials
  60. Online backup proxy
  61. Machine options
  62. Log cleanup rules
  63. Default backup and recovery options
  64. archive protection
  65. source files exclusion
  66. volume shadow copy service
  67. compression level
  68. backup performance
  69. network connection speed
  70. windows event log
  71. backup splitting
  72. media components
  73. error handling
  74. dual destination
  75. task failure handling
  76. additional settings
  77. Default recovery options
  78. recovery priority
  79. Vaults
  80. Centralized vaults
  81. Actions on centralized vaults
  82. creating a managed centralized vault
  83. vault encryption
  84. creating an unmanaged centralized vault
  85. Tape libraries
  86. rsm media pools
  87. getting started with a tape library
  88. actions on a tape library vault
  89. recovering from tape library
  90. tape rotation
  91. choosing a backup scheme
  92. case to analyze
  93. tape planning
  94. Personal vaults
  95. Actions on personal vaults
  96. Common operations
  97. Operations with backups
  98. Deleting archives and backups
  99. Filtering and sorting archives
  100. Scheduling
  101. Daily schedule
  102. Weekly schedule
  103. Monthly schedule
  104. Advanced scheduling settings
  105. At Windows Event Log event
  106. When an ADRM alert is received
  107. User is idle
  108. Fits time interval
  109. Time since last backup
  110. Direct management
  111. Backup plans and tasks
  112. understanding states and statuses
  113. task states
  114. task statuses
  115. working with backup plans and tasks
  116. filtering and sorting backup plans and tasks
  117. run backup plan
  118. backup plan details
  119. actions on log entries
  120. filtering and sorting log entries
  121. Creating a backup plan
  122. archive validation
  123. Why is the program asking for the password
  124. Items to back up
  125. Access credentials for source
  126. Exclusions
  127. Archive
  128. Simplified naming of backup files
  129. usage examples
  130. Access credentials for archive location
  131. Backup schemes
  132. simple scheme
  133. tower of hanoi scheme
  134. custom backup scheme
  135. Archive validation
  136. Recovering data
  137. when to recover
  138. Task credentials
  139. Data type
  140. Access credentials for location
  141. Destination selection
  142. disk destination
  143. mbr destination
  144. virtual machine settings
  145. file destination
  146. recovery exclusions
  147. Access credentials for destination
  148. How to convert a disk backup to a virtual machine
  149. Bootability troubleshooting
  150. Recovering a vast number of files from a file backup
  151. Recovering the storage node
  152. Validating vaults, archives and backups
  153. Archive selection
  154. Backup selection
  155. When to validate
  156. Mounting an image
  157. Access credentials
  158. Managing mounted images
  159. Location selection
  160. Acronis Secure Zone
  161. acronis secure zone size
  162. Managing Acronis Secure Zone
  163. Bootable media
  164. How to create bootable media
  165. kernel parameters
  166. network settings
  167. network port
  168. Connecting to a machine booted from media
  169. Working under bootable media
  170. List of commands and utilities available in Linux-based bootable media
  171. Recovering MD devices and logical volumes
  172. creating the volume structure manually
  173. Acronis PXE Server
  174. acronis pxe server installation
  175. Disk management
  176. Running Acronis Disk Director Lite
  177. Disk operations
  178. basic disk cloning
  179. cloning method and advanced options
  180. Volume operations
  181. types of dynamic volumes
  182. create volume wizard
  183. set the volume size
  184. delete volume
  185. change volume letter
  186. Pending operations
  187. Collecting system information
  188. Centralized management
  189. Backup policies
  190. backup policy deployment states
  191. actions on backup policies
  192. machines selection
  193. policy details
  194. Physical machines
  195. actions on machines
  196. applying policies
  197. importing machines from active directory
  198. synchronizing machines with a text file
  199. importing machines from a text file
  200. moving a machine to another group
  201. filtering and sorting machines
  202. actions on groups
  203. creating a custom static or dynamic group
  204. organizational unit criterion
  205. move one group to another
  206. Virtual machines
  207. virtual machines on a management server
  208. Storage nodes
  209. actions on storage nodes
  210. adding a storage node
  211. storage node details
  212. Tasks
  213. filtering and sorting tasks
  214. centralized log entry details
  215. Reporting
  216. report about the backup policies
  217. report about the backup plans
  218. report about the archives and backups
  219. report about the task activities
  220. Parameters set through administrative template
  221. connection parameters
  222. Parameters set through GUI
  223. Parameters set through Windows registry
  224. Creating a backup policy
  225. Policy credentials
  226. files to back up selection rules
  227. Backup scheme selection
  228. Online backup
  229. What data can I back up and recover
  230. How long will my backups be kept in the online storage
  231. Backup and recovery FAQ
  232. Initial Seeding FAQ
  233. what types of hard drive can i use for initial seeding
  234. how to package a hard drive for shipment
  235. how do i track an initial seeding order status
  236. Large Scale Recovery FAQ
  237. is large scale recovery a paid service
  238. Subscription lifecycle FAQ
  239. what happens when my subscription expires
  240. Where do I start
  241. Activating online backup subscriptions
  242. Reassigning an activated subscription
  243. Configuring proxy settings
  244. Limitations of the online storage
  245. Terminology reference
  246. Glossary
  247. backup operation
  248. backup scheme
  249. centralized backup plan
  250. deduplicating vault
  251. disk group
  252. dynamic disk
  253. dynamic volume
  254. full backup
  255. managed vault
  256. recovery point
  257. tower of hanoi
  258. unmanaged vault
  259. virtual machine
BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION first page preview

BACKUP RECOVERY 10 ADVANCED SERVER SBS EDITION

Brand: ACRONIS | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. acronis backup & recovery 10 overview
  6. Getting started
  7. Using the management console
  8. operations with panes
  9. action pages
  10. Agent for Windows
  11. Components for centralized management
  12. storage node
  13. pxe server
  14. Management Console
  15. Supported operating systems
  16. System requirements
  17. basic concepts
  18. Full, incremental and differential backups
  19. User privileges on a managed machine
  20. GFS backup scheme
  21. Tower of Hanoi backup scheme
  22. Retention rules
  23. Backing up dynamic volumes (Windows)
  24. recovering dynamic volumes
  25. Tape support
  26. Using a single tape drive
  27. Proprietary Acronis technologies
  28. Acronis Startup Recovery Manager
  29. Acronis Active Restore
  30. usage scenarios
  31. Understanding centralized management
  32. Setting up centralized data protection in a heterogeneous network
  33. protecting the servers
  34. protecting the workstations
  35. Grouping the registered machines
  36. a policy on a machine or a group
  37. operations with a machine
  38. inheritance of policies
  39. Backup policy's state and statuses
  40. policy status on a machine
  41. policy deployment state on a group
  42. Deduplication
  43. how deduplication works
  44. when deduplication is most effective
  45. deduplication ratio
  46. Privileges for centralized management
  47. remote connection
  48. user privileges on a storage node
  49. management server administrator rights
  50. rights for acronis services
  51. secure communication
  52. configuring communication settings
  53. network port configuration
  54. ssl certificates
  55. Options
  56. Time-based alerts
  57. Management server options
  58. Event tracing
  59. Domain access credentials
  60. Machine options
  61. Machine management
  62. snmp notifications
  63. Log cleanup rules
  64. Customer Experience Program
  65. archive protection
  66. source files exclusion
  67. post-backup command
  68. pre-data capture command
  69. file-level backup snapshot
  70. compression level
  71. backup performance
  72. network connection speed
  73. windows event log
  74. fast incremental/differential backup
  75. media components
  76. dual destination
  77. task start conditions
  78. task failure handling
  79. additional settings
  80. Default recovery options
  81. pre-recovery command
  82. post-recovery command
  83. error handling
  84. Vaults
  85. Centralized vaults
  86. Actions on centralized vaults
  87. creating a managed centralized vault
  88. vault encryption
  89. attaching a managed vault
  90. Tape libraries
  91. rsm media pools
  92. getting started with a tape library
  93. tape library as a managed vault
  94. actions with archives on tapes in a library
  95. managing a tape library
  96. tape rotation
  97. criteria of the choice
  98. tape planning
  99. Personal vaults
  100. Actions on personal vaults
  101. creating a personal vault
  102. Common operations
  103. Operations with backups
  104. Deleting archives and backups
  105. Scheduling
  106. Daily schedule
  107. Weekly schedule
  108. Monthly schedule
  109. Advanced scheduling settings
  110. At Windows Event Log event
  111. Conditions
  112. User is idle
  113. Fits time interval
  114. User logged off
  115. Direct management
  116. Backup plans and tasks
  117. understanding states and statuses
  118. task states
  119. task statuses
  120. working with backup plans and tasks
  121. filtering and sorting backup plans and tasks
  122. run backup plan
  123. backup plan details
  124. actions on log entries
  125. filtering and sorting log entries
  126. Creating a backup plan
  127. archive validation
  128. Why is the program asking for the password
  129. Source type
  130. selecting disks and volumes
  131. Access credentials for source
  132. Archive
  133. Access credentials for archive location
  134. Backup schemes
  135. simple scheme
  136. tower of hanoi scheme
  137. custom backup scheme
  138. Archive validation
  139. Recovering data
  140. when to recover
  141. Task credentials
  142. Data type
  143. Access credentials for location
  144. Destination selection
  145. disk destination
  146. mbr destination
  147. volume properties
  148. virtual machine settings
  149. file destination
  150. Access credentials for destination
  151. Universal Restore
  152. How to convert a disk backup to a virtual machine
  153. Bootability troubleshooting
  154. Recovering a vast number of files from a file backup
  155. Recovering the storage node
  156. Validating vaults, archives and backups
  157. Archive selection
  158. Backup selection
  159. When to validate
  160. Access credentials
  161. Volume selection
  162. Location selection
  163. Acronis Secure Zone
  164. acronis secure zone size
  165. Managing Acronis Secure Zone
  166. Bootable media
  167. How to create bootable media
  168. kernel parameters
  169. network settings
  170. network port
  171. adding the acronis plug-in to winpe 1.x
  172. Connecting to a machine booted from media
  173. setting up a display mode
  174. List of commands and utilities available in Linux-based bootable media
  175. Recovering MD devices and logical volumes
  176. creating the volume structure manually
  177. Acronis PXE Server
  178. Disk management
  179. Basic precautions
  180. Choosing the operating system for disk management
  181. Disk operations
  182. selecting source and target disks
  183. Volume operations
  184. creating a volume
  185. create volume wizard
  186. set the volume size
  187. delete volume
  188. set active volume
  189. change volume label
  190. Pending operations
  191. Centralized management
  192. Backup policies
  193. backup policy deployment states
  194. actions on backup policies
  195. machines selection
  196. policy details
  197. Physical machines
  198. actions on machines
  199. applying policies
  200. importing machines from active directory
  201. importing machines from a text file
  202. machine details
  203. filtering and sorting machines
  204. creating a custom static or dynamic group
  205. organizational unit criterion
  206. listed in txt/csv file criterion
  207. group details
  208. Virtual machines
  209. virtual machines on a management server
  210. support for vcenter clusters
  211. Storage nodes
  212. adding a storage node
  213. Tasks
  214. filtering and sorting tasks
  215. Reporting
  216. generating reports
  217. report about the backup policies
  218. report about the tasks
  219. report about the archives and backups
  220. report about the task activities
  221. Parameters set through administrative template
  222. connection parameters
  223. Parameters set through GUI
  224. Parameters set through Windows registry
  225. Policy credentials
  226. Items to back up
  227. files to back up selection rules
  228. Exclusions
  229. Backup scheme selection
  230. Glossary
  231. agent-side cleanup
  232. backup plan (plan)
  233. backup scheme
  234. centralized backup plan
  235. deduplicating vault
  236. disk group
  237. dynamic disk
  238. dynamic volume
  239. gfs (grandfather-father-son)
  240. media builder
  241. recovery point
  242. storage node-side validation
  243. unmanaged vault
  244. Table Of Contents
  245. Table Of Contents
  246. Table Of Contents
  247. Table Of Contents
  248. Table Of Contents
  249. Table Of Contents
  250. Table Of Contents
  251. Table Of Contents
ACRONIS categories
More ACRONIS categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine