4 Copyright © Acronis, Inc., 2000-2011
4.4.5 Upon an Acronis Drive Monitor alert ..................................................................................................... 62
4.4.6 Conditions ............................................................................................................................................... 63
4.5 Replication and retention of backups .................................................................................. 66
4.5.1 Supported locations ................................................................................................................................ 67
4.5.2 Setting up replication of backups ........................................................................................................... 68
4.5.3 Setting up retention of backups ............................................................................................................. 68
4.5.4 Retention rules for the Custom scheme ................................................................................................. 69
4.5.5 Replication/cleanup inactivity time ........................................................................................................ 70
4.5.6 Usage examples ...................................................................................................................................... 71
4.6 Setting up regular conversion to a virtual machine .............................................................. 72
4.6.1 Setting up a conversion schedule ........................................................................................................... 73
4.6.2 Selecting a machine that will perform conversion ................................................................................. 73
4.6.3 How regular conversion to VM works .................................................................................................... 74
4.7 Default backup options ....................................................................................................... 75
4.7.1 Additional settings .................................................................................................................................. 77
4.7.2 Archive protection .................................................................................................................................. 78
4.7.3 Backup cataloging ................................................................................................................................... 79
4.7.4 Backup performance .............................................................................................................................. 79
4.7.5 Backup splitting....................................................................................................................................... 81
4.7.6 Compression level................................................................................................................................... 82
4.7.7 Disaster recovery plan (DRP) .................................................................................................................. 82
4.7.8 Error handling ......................................................................................................................................... 83
4.7.9 Event tracing ........................................................................................................................................... 84
4.7.10 Fast incremental/differential backup ..................................................................................................... 85
4.7.11 File-level backup snapshot...................................................................................................................... 85
4.7.12 File-level security .................................................................................................................................... 86
4.7.13 Media components................................................................................................................................. 86
4.7.14 Mount points .......................................................................................................................................... 87
4.7.15 Multi-volume snapshot .......................................................................................................................... 88
4.7.16 Notifications............................................................................................................................................ 88
4.7.17 Pre/Post commands ............................................................................................................................... 90
4.7.18 Pre/Post data capture commands .......................................................................................................... 91
4.7.19 Replication/cleanup inactivity time ........................................................................................................ 93
4.7.20 Sector-by-sector backup ......................................................................................................................... 93
4.7.21 Task failure handling ............................................................................................................................... 94
4.7.22 Task start conditions ............................................................................................................................... 94
4.7.23 Volume Shadow Copy Service ................................................................................................................ 95
5 Recovery ................................................................................................................................... 97
5.1 Creating a recovery task ...................................................................................................... 97
5.1.1 What to recover ...................................................................................................................................... 99
5.1.2 Access credentials for location ............................................................................................................. 102
5.1.3 Access credentials for destination ........................................................................................................ 103
5.1.4 Where to recover.................................................................................................................................. 103
5.1.5 When to recover ................................................................................................................................... 110
5.1.6 Task credentials .................................................................................................................................... 111
5.2 Acronis Universal Restore ................................................................................................. 111
5.2.1 Getting Universal Restore ..................................................................................................................... 111
5.2.2 Using Universal Restore ........................................................................................................................ 112
5.3 Recovering BIOS-based systems to UEFI-based and vice versa........................................... 114
5.3.1 Recovering volumes.............................................................................................................................. 114
5.3.2 Recovering disks ................................................................................................................................... 116
5.4 Acronis Active Restore ...................................................................................................... 118