5 Copyright © Acronis International GmbH, 2002-2012
4.2.8 Backup plan's credentials ............................................................................................................................. 70
4.2.9 Label (Preserving machine properties in a backup) .................................................................................... 71
4.2.10 Why is the program asking for the password? ........................................................................................... 72
4.3 Simplified naming of backup files ............................................................................................72
4.3.1 The [DATE] variable ....................................................................................................................................... 73
4.3.2 Backup splitting and simplified file naming ................................................................................................. 74
4.3.3 Usage examples ............................................................................................................................................. 74
4.4 Scheduling ................................................................................................................................77
4.4.1 Daily schedule ................................................................................................................................................ 79
4.4.2 Weekly schedule ........................................................................................................................................... 81
4.4.3 Monthly schedule .......................................................................................................................................... 83
4.4.4 At Windows Event Log event ....................................................................................................................... 85
4.4.5 Advanced scheduling settings ...................................................................................................................... 87
4.4.6 Conditions ...................................................................................................................................................... 88
4.5 Replication and retention of backups ......................................................................................92
4.5.1 Supported locations ...................................................................................................................................... 93
4.5.2 Setting up replication of backups ................................................................................................................. 94
4.5.3 Setting up retention of backups ................................................................................................................... 95
4.5.4 Retention rules for the Custom scheme ...................................................................................................... 96
4.5.5 Replication/cleanup inactivity time ............................................................................................................. 97
4.5.6 Usage examples ............................................................................................................................................. 98
4.6 Default backup options ..........................................................................................................101
4.6.1 Additional settings....................................................................................................................................... 103
4.6.2 Archive protection ....................................................................................................................................... 104
4.6.3 Backup cataloging ....................................................................................................................................... 105
4.6.4 Backup performance ................................................................................................................................... 106
4.6.5 Backup splitting ........................................................................................................................................... 107
4.6.6 Compression level ....................................................................................................................................... 108
4.6.7 Disaster recovery plan (DRP) ...................................................................................................................... 109
4.6.8 Error handling .............................................................................................................................................. 109
4.6.9 Event tracing ................................................................................................................................................ 110
4.6.10 Fast incremental/differential backup ........................................................................................................ 111
4.6.11 File-level backup snapshot ......................................................................................................................... 112
4.6.12 File-level security ......................................................................................................................................... 112
4.6.13 LVM snapshotting ....................................................................................................................................... 113
4.6.14 Media components ..................................................................................................................................... 114
4.6.15 Mount points ............................................................................................................................................... 115
4.6.16 Multi-volume snapshot ............................................................................................................................... 116
4.6.17 Notifications ................................................................................................................................................. 116
4.6.18 Pre/Post commands .................................................................................................................................... 118
4.6.19 Pre/Post data capture commands ............................................................................................................. 119
4.6.20 Replication/cleanup inactivity time ........................................................................................................... 121
4.6.21 Sector-by-sector backup ............................................................................................................................. 122
4.6.22 Tape management ...................................................................................................................................... 122
4.6.23 Task failure handling ................................................................................................................................... 123
4.6.24 Task start conditions ................................................................................................................................... 124
4.6.25 Volume Shadow Copy Service .................................................................................................................... 125
5 Recovery ........................................................................................................................... 127
5.1 Creating a recovery task ........................................................................................................127
5.1.1 What to recover .......................................................................................................................................... 129
5.1.2 Access credentials for location ................................................................................................................... 133
5.1.3 Access credentials for destination ............................................................................................................. 133
5.1.4 Where to recover ........................................................................................................................................ 134