9
Copyright © Acronis, Inc., 2000-2010
Overview of all configured and running operations with color-coding for successful and failed
operations
Enterprise level of security
Controlling user rights to perform operations and access backups
Running services with minimal user rights
Restricted remote access to a backup agent
Secure communication between the product components
Using third-party certificates for authentication of the components
Data encryption options for both data transmission and storage
Backup of remote machines to a centralized storage node behind firewalls.
1.2
Getting started
Direct management
1.
Install Acronis Backup & Recovery 10 Management Console and Acronis Backup & Recovery 10
Agent.
2.
Start the console.
Windows
Start the console by selecting it from the start menu.
Linux
Log in as root or log in as an ordinary user and then switch user as required. Start the console
with the command
/usr/sbin/acronis_console
3.
Connect the console to the machine where the agent is installed.
Where to go from here
For what to do next see "Basic concepts (p. 28)".
For understanding of the GUI elements see "Using the management console (p. 11)".
For how to enable non-root users to start the console under Linux see "Privileges for local connection
(p. 80)".
For how to enable remote connection to a machine running Linux see "Privileges for remote
connection in Linux (p. 81)".
Centralized management
We recommend that you first try to manage the single machine using direct management as
described above.
To start with centralized management:
1.
Install Acronis Backup & Recovery 10 Management Server (p. 20).
2.
Install Acronis Backup & Recovery 10 Agents on the machines that need data protection. When
installing the agents, register each of the machines on the management server. To do so, enter
the server's IP or name and the centralized administrator's credentials in one of the installation
wizard's windows.