4 Copyright © Acronis International GmbH, 2002-2016
4.3 Simplified naming of backup files ............................................................................................53
4.3.1 The [DATE] variable ....................................................................................................................................... 54
4.3.2 Backup splitting and simplified file naming ................................................................................................. 55
4.3.3 Usage examples ............................................................................................................................................. 55
4.4 Scheduling ................................................................................................................................58
4.4.1 Daily schedule ................................................................................................................................................ 59
4.4.2 Weekly schedule ........................................................................................................................................... 61
4.4.3 Monthly schedule .......................................................................................................................................... 63
4.4.4 Conditions ...................................................................................................................................................... 65
4.5 Replication and retention of backups ......................................................................................67
4.5.1 Supported locations ...................................................................................................................................... 69
4.5.2 Setting up replication of backups ................................................................................................................. 69
4.5.3 Setting up retention of backups ................................................................................................................... 70
4.5.4 Retention rules for the Custom scheme ...................................................................................................... 71
4.5.5 Usage examples ............................................................................................................................................. 72
4.6 How to disable backup cataloging ...........................................................................................74
4.7 Default backup options ............................................................................................................74
4.7.1 Additional settings......................................................................................................................................... 76
4.7.2 Archive protection ......................................................................................................................................... 77
4.7.3 Backup cataloging ......................................................................................................................................... 78
4.7.4 Backup performance ..................................................................................................................................... 78
4.7.5 Backup splitting ............................................................................................................................................. 79
4.7.6 Compression level ......................................................................................................................................... 80
4.7.7 Disaster recovery plan (DRP) ........................................................................................................................ 81
4.7.8 E-mail notifications ........................................................................................................................................ 82
4.7.9 Error handling ................................................................................................................................................ 83
4.7.10 Event tracing .................................................................................................................................................. 84
4.7.11 Fast incremental/differential backup .......................................................................................................... 84
4.7.12 File-level backup snapshot ........................................................................................................................... 85
4.7.13 LVM snapshotting ......................................................................................................................................... 85
4.7.14 Media components ....................................................................................................................................... 87
4.7.15 Pre/Post commands ...................................................................................................................................... 87
4.7.16 Pre/Post data capture commands ............................................................................................................... 89
4.7.17 Replication/cleanup inactivity time ............................................................................................................. 91
4.7.18 Sector-by-sector backup ............................................................................................................................... 91
4.7.19 Task failure handling ..................................................................................................................................... 91
4.7.20 Task start conditions ..................................................................................................................................... 92
5 Recovery ....................................................................................................................... 94
5.1 Creating a recovery task ..........................................................................................................94
5.1.1 What to recover ............................................................................................................................................ 95
5.1.2 Access credentials for location ..................................................................................................................... 98
5.1.3 Access credentials for destination ............................................................................................................... 99
5.1.4 Where to recover .......................................................................................................................................... 99
5.1.5 When to recover ......................................................................................................................................... 105
5.1.6 Task credentials ........................................................................................................................................... 105
5.2 Bootability troubleshooting ...................................................................................................106
5.2.1 How to reactivate GRUB and change its configuration ............................................................................ 107
5.3 Default recovery options .......................................................................................................108
5.3.1 Additional settings....................................................................................................................................... 110
5.3.2 E-mail notifications ...................................................................................................................................... 111
5.3.3 Error handling .............................................................................................................................................. 112
5.3.4 Event tracing ................................................................................................................................................ 112
5.3.5 File-level security ......................................................................................................................................... 113