
3.1.3
Time-based alerts .......................................................................................................................................77
3.1.4
Number of tasks .........................................................................................................................................77
3.1.5
Fonts ...........................................................................................................................................................77
3.2
Management server options ...................................................................................................78
3.2.1
Logging level ...............................................................................................................................................78
3.2.2
Log cleanup rules ........................................................................................................................................78
3.2.3
Event tracing ...............................................................................................................................................79
3.2.4
Domain access credentials .........................................................................................................................80
3.2.5
Acronis WOL Proxy .....................................................................................................................................80
3.2.6
VM protection options ...............................................................................................................................80
3.3
Machine options ......................................................................................................................81
3.3.1
Machine management ...............................................................................................................................82
3.3.2
Event tracing ...............................................................................................................................................82
3.3.3
Log cleanup rules ........................................................................................................................................84
3.3.4
Customer Experience Program ..................................................................................................................85
3.4
Default backup and recovery options ......................................................................................85
3.4.1
Default backup options ..............................................................................................................................85
3.4.2
Default recovery options ......................................................................................................................... 107
4
Vaults .................................................................................................................................. 115
4.1
Centralized vaults ................................................................................................................. 116
4.1.1
Working with the "Centralized vault" view ............................................................................................ 117
4.1.2
Actions on centralized vaults .................................................................................................................. 118
4.1.3
Tape libraries ........................................................................................................................................... 123
4.2
Personal vaults ...................................................................................................................... 145
4.2.1
Working with the "Personal vault" view ................................................................................................. 145
4.2.2
Actions on personal vaults ...................................................................................................................... 146
4.3
Common operations ............................................................................................................. 148
4.3.1
Operations with archives stored in a vault ............................................................................................. 148
4.3.2
Operations with backups ........................................................................................................................ 149
4.3.3
Deleting archives and backups ................................................................................................................ 150
4.3.4
Filtering and sorting archives .................................................................................................................. 150
5
Scheduling ........................................................................................................................... 152
5.1
Daily schedule ....................................................................................................................... 153
5.2
Weekly schedule ................................................................................................................... 155
5.3
Monthly schedule ................................................................................................................. 157
5.4
Advanced scheduling settings .............................................................................................. 159
5.5
At Windows Event Log event ................................................................................................ 160
5.6
Conditions ............................................................................................................................. 162
5.6.1
User is idle ................................................................................................................................................ 163
5.6.2
Location's host is available ...................................................................................................................... 163
5.6.3
Fits time interval ...................................................................................................................................... 164
5.6.4
User logged off ........................................................................................................................................ 165
5.6.5
Time since last backup ............................................................................................................................ 165
6
Direct management ............................................................................................................. 166
6.1
Administering a managed machine ...................................................................................... 166
6.1.1
Dashboard ............................................................................................................................................... 166
6.1.2
Backup plans and tasks ........................................................................................................................... 168
6.1.3
Log ............................................................................................................................................................ 179