6.8
Acronis Secure Zone ............................................................................................................. 249
6.8.1
Creating Acronis Secure Zone ................................................................................................................. 249
6.8.2
Managing Acronis Secure Zone ............................................................................................................... 251
6.9
Acronis Startup Recovery Manager ...................................................................................... 252
6.10 Bootable media ..................................................................................................................... 253
6.10.1
How to create bootable media ............................................................................................................... 254
6.10.2
Connecting to a machine booted from media ....................................................................................... 261
6.10.3
Working under bootable media .............................................................................................................. 261
6.10.4
List of commands and utilities available in Linux-based bootable media ............................................. 263
6.10.5
Recovering MD devices and logical volumes .......................................................................................... 264
6.10.6
Acronis PXE Server ................................................................................................................................... 268
6.11 Disk management ................................................................................................................. 269
6.11.1
Basic precautions ..................................................................................................................................... 270
6.11.2
Running Acronis Disk Director Lite .......................................................................................................... 270
6.11.3
Choosing the operating system for disk management .......................................................................... 271
6.11.4
"Disk management" view ........................................................................................................................ 271
6.11.5
Disk operations ........................................................................................................................................ 272
6.11.6
Volume operations .................................................................................................................................. 277
6.11.7
Pending operations ................................................................................................................................. 284
6.12 Collecting system information .............................................................................................. 284
7
Centralized management ..................................................................................................... 285
7.1
Administering Acronis Backup & Recovery 10 Management Server .................................... 285
7.1.1
Dashboard ............................................................................................................................................... 285
7.1.2
Backup policies ........................................................................................................................................ 287
7.1.3
Physical machines .................................................................................................................................... 292
7.1.4
Virtual machines ...................................................................................................................................... 309
7.1.5
Storage nodes .......................................................................................................................................... 317
7.1.6
Tasks ......................................................................................................................................................... 320
7.1.7
Log ............................................................................................................................................................ 323
7.1.8
Reporting ................................................................................................................................................. 326
7.2
Configuring Acronis Backup & Recovery 10 components .................................................... 331
7.2.1
Parameters set through administrative template .................................................................................. 332
7.2.2
Parameters set through GUI ................................................................................................................... 346
7.2.3
Parameters set through Windows registry ............................................................................................ 346
7.3
Creating a backup policy ....................................................................................................... 347
7.3.1
Policy credentials ..................................................................................................................................... 349
7.3.2
Items to back up ...................................................................................................................................... 350
7.3.3
Access credentials for source .................................................................................................................. 354
7.3.4
Exclusions ................................................................................................................................................. 355
7.3.5
Archive ..................................................................................................................................................... 355
7.3.6
Access credentials for location ................................................................................................................ 356
7.3.7
Backup scheme selection ........................................................................................................................ 357
7.3.8
Archive validation .................................................................................................................................... 366
8
Glossary ............................................................................................................................... 368
9
Index ................................................................................................................................... 383