236
Copyright © Acronis, Inc., 2000-2010
To select a personal vault, expand the
Personal
group and click the appropriate vault.
To select a local folder (CD/DVD drive, or locally attached tape device), expand the
Local folders
group and click the required folder.
To select a network share, expand the
Network folders
group, select the required networked
machine and then click the shared folder. If the network share requires access credentials, the
program will ask for them.
To select
FTP
or
SFTP
server, expand the corresponding group and click the appropriate folder on
the server.
According to the original FTP specification, credentials required for access to FTP servers are
transferred through a network as plaintext. This means that the user name and password can be
intercepted by an eavesdropper using a packet sniffer.
Using the archives table
To assist you with choosing the right location, the table displays the names of the archives contained
in each location you select. While you are reviewing the location content, archives can be added,
deleted or modified by another user or by the program itself according to scheduled operations. Use
the
Refresh
button to refresh the list of archives.
6.4.5
Access credentials for source
Specify the credentials required for access to the location where the backup archive is stored.
To specify credentials
1.
Select one of the following:
Use the task credentials
The program will access the location using the credentials of the task account specified in the
General section.
Use the following credentials
The program will access the location using the credentials you specify. Use this option if the
task account does not have access permissions to the location. You might need to provide
special credentials for a network share or a storage node vault.
Specify:
User name
. When entering the name of an Active Directory user account, be sure to also
specify the domain name (DOMAIN\Username or Username@domain)
Password
. The password for the account.
2.
Click
OK
.
According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.
6.4.6
When to validate
As validation is a resource-intensive operation, it makes sense to schedule validation to the managed
machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the
data is not corrupted and can be successfully recovered, consider starting validation right after the
task creation.