3.1.1
Startup page ...............................................................................................................................................79
3.1.2
Pop-up messages ........................................................................................................................................79
3.1.3
Time-based alerts .......................................................................................................................................80
3.1.4
Number of tasks .........................................................................................................................................80
3.1.5
Fonts ...........................................................................................................................................................80
3.2
Management server options ...................................................................................................81
3.2.1
Logging level ...............................................................................................................................................81
3.2.2
Log cleanup rules ........................................................................................................................................81
3.2.3
Event tracing ...............................................................................................................................................82
3.2.4
Domain access credentials .........................................................................................................................83
3.2.5
Acronis WOL Proxy .....................................................................................................................................83
3.2.6
VM protection options ...............................................................................................................................83
3.2.7
Online backup proxy ...................................................................................................................................84
3.3
Machine options ......................................................................................................................85
3.3.1
Machine management ...............................................................................................................................85
3.3.2
Event tracing ...............................................................................................................................................86
3.3.3
Log cleanup rules ........................................................................................................................................88
3.3.4
Online backup proxy ...................................................................................................................................88
3.3.5
Customer Experience Program ..................................................................................................................88
3.4
Default backup and recovery options ......................................................................................89
3.4.1
Default backup options ..............................................................................................................................89
3.4.2
Default recovery options ......................................................................................................................... 111
4
Vaults .................................................................................................................................. 120
4.1
Centralized vaults ................................................................................................................. 121
4.1.1
Working with the "Centralized vault" view ............................................................................................ 122
4.1.2
Actions on centralized vaults .................................................................................................................. 123
4.1.3
Tape libraries ........................................................................................................................................... 128
4.2
Personal vaults ...................................................................................................................... 151
4.2.1
Working with the "Personal vault" view ................................................................................................. 152
4.2.2
Actions on personal vaults ...................................................................................................................... 153
4.3
Common operations ............................................................................................................. 154
4.3.1
Operations with archives stored in a vault ............................................................................................. 154
4.3.2
Operations with backups ........................................................................................................................ 155
4.3.3
Deleting archives and backups ................................................................................................................ 156
4.3.4
Filtering and sorting archives .................................................................................................................. 157
5
Scheduling ........................................................................................................................... 158
5.1
Daily schedule ....................................................................................................................... 159
5.2
Weekly schedule ................................................................................................................... 161
5.3
Monthly schedule ................................................................................................................. 163
5.4
Advanced scheduling settings .............................................................................................. 165
5.5
At Windows Event Log event ................................................................................................ 167
5.6
When an ADRM alert is received .......................................................................................... 169
5.7
Conditions ............................................................................................................................. 169
5.7.1
User is idle ................................................................................................................................................ 170
5.7.2
Location's host is available ...................................................................................................................... 170
5.7.3
Fits time interval ...................................................................................................................................... 171
5.7.4
User logged off ........................................................................................................................................ 171
5.7.5
Time since last backup ............................................................................................................................ 172