![ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER - User Manual Download Page 4](http://html1.mh-extra.com/html/acronis/backup-recovery-10-advanced-server/backup-recovery-10-advanced-server_user-manual_2841304004.webp)
3
Options .................................................................................................................................. 86
3.1
Console options .......................................................................................................................86
3.1.1
Startup page ...............................................................................................................................................86
3.1.2
Pop-up messages ........................................................................................................................................86
3.1.3
Time-based alerts .......................................................................................................................................87
3.1.4
Number of tasks .........................................................................................................................................87
3.1.5
Fonts ...........................................................................................................................................................87
3.2
Management server options ...................................................................................................88
3.2.1
Logging level ...............................................................................................................................................88
3.2.2
Log cleanup rules ........................................................................................................................................88
3.2.3
Event tracing ...............................................................................................................................................89
3.2.4
Domain access credentials .........................................................................................................................90
3.2.5
Acronis WOL Proxy .....................................................................................................................................90
3.2.6
VM protection options ...............................................................................................................................90
3.3
Machine options ......................................................................................................................91
3.3.1
Machine management ...............................................................................................................................92
3.3.2
Event tracing ...............................................................................................................................................92
3.3.3
Log cleanup rules ........................................................................................................................................94
3.3.4
Customer Experience Program ..................................................................................................................95
3.4
Default backup and recovery options ......................................................................................95
3.4.1
Default backup options ..............................................................................................................................95
3.4.2
Default recovery options ......................................................................................................................... 117
4
Vaults .................................................................................................................................. 125
4.1
Centralized vaults ................................................................................................................. 126
4.1.1
Working with the "Centralized vault" view ............................................................................................ 127
4.1.2
Actions on centralized vaults .................................................................................................................. 128
4.1.3
Tape libraries ........................................................................................................................................... 133
4.2
Personal vaults ...................................................................................................................... 155
4.2.1
Working with the "Personal vault" view ................................................................................................. 155
4.2.2
Actions on personal vaults ...................................................................................................................... 156
4.3
Common operations ............................................................................................................. 158
4.3.1
Operations with archives stored in a vault ............................................................................................. 158
4.3.2
Operations with backups ........................................................................................................................ 159
4.3.3
Deleting archives and backups ................................................................................................................ 160
4.3.4
Filtering and sorting archives .................................................................................................................. 160
5
Scheduling ........................................................................................................................... 162
5.1
Daily schedule ....................................................................................................................... 163
5.2
Weekly schedule ................................................................................................................... 165
5.3
Monthly schedule ................................................................................................................. 167
5.4
At Windows Event Log event ................................................................................................ 169
5.5
Advanced scheduling settings .............................................................................................. 171
5.6
Conditions ............................................................................................................................. 172
5.6.1
User is idle ................................................................................................................................................ 173
5.6.2
Location's host is available ...................................................................................................................... 173
5.6.3
Fits time interval ...................................................................................................................................... 174
5.6.4
User logged off ........................................................................................................................................ 175
5.6.5
Time since last backup ............................................................................................................................ 175