115
Copyright © Acronis, Inc., 2000-2010
High
– to maximize the recovery process speed by taking resources from the other processes.
3.4.2.3
File-level security
This option is effective only for recovery from file-level backup of Windows files.
This option defines whether to recover NTFS permissions for files along with the files.
The preset is:
Recover files with their security settings
.
If the file NTFS permissions were preserved during backup (p. 104), you can choose whether to
recover the permissions or let the files inherit the NTFS permissions from the folder to which they
are recovered.
3.4.2.4
Notifications
Acronis Backup & Recovery 10 provides the ability of notifying users about recovery completion
through e-mail or the messaging service.
This option is effective for Windows and Linux operating systems.
This option is not available when operating under the bootable media.
The option enables you to receive e-mail notifications about the recovery task's successful
completion, failure or need for interaction along with the full log of the task.
The preset is:
Disabled
.
To configure e-mail notification
1.
Select the
Send e-mail notifications
check box to activate notifications.
2.
In the
E-mail addresses
field, type the e-mail address to which notifications will be sent. You can
enter several addresses separated by semicolons.
3.
Under
Send notifications
, select the appropriate check boxes as follows:
When backup completes successfully
– to send a notification when the backup task has
completed successfully
When backup fails
– to send a notification when the backup task has failed
The
When user interaction is required
check box is always selected.
4.
For the e-mail message to include the log entries related to the backup, select the
Add full log to
the notification
check box.
5.
Click
Additional e-mail parameters
, to configure additional e-mail parameters as follows, then
click
OK
:
From
- type the e-mail address of the user from whom the message will be sent. If you leave
this field empty, messages will be constructed as if they are from the destination address.
Use encryption
– you can opt for encrypted connection to the mail server. SSL and TLS
encryption types are available for selection.
Some Internet service providers require authentication on the incoming mail server before
being allowed to send something. If this is your case, select the
Log on to incoming mail
server
check box to enable a POP server and to set up its settings:
Incoming mail server (POP)
– enter the name of the POP server.