4 Copyright © Acronis International GmbH, 2002-2016
4.3.1 The [DATE] variable ....................................................................................................................................... 52
4.3.2 Backup splitting and simplified file naming ................................................................................................. 53
4.3.3 Usage examples ............................................................................................................................................. 53
4.4 Scheduling ................................................................................................................................56
4.4.1 Daily schedule ................................................................................................................................................ 57
4.4.2 Weekly schedule ........................................................................................................................................... 59
4.4.3 Monthly schedule .......................................................................................................................................... 62
4.4.4 On Windows Event Log event ...................................................................................................................... 64
4.4.5 Conditions ...................................................................................................................................................... 65
4.5 Replication and retention of backups ......................................................................................69
4.5.1 Supported locations ...................................................................................................................................... 70
4.5.2 Setting up replication of backups ................................................................................................................. 70
4.5.3 Setting up retention of backups ................................................................................................................... 71
4.5.4 Retention rules for the Custom scheme ...................................................................................................... 72
4.5.5 Usage examples ............................................................................................................................................. 73
4.6 How to disable backup cataloging ...........................................................................................75
4.7 Default backup options ............................................................................................................75
4.7.1 Additional settings......................................................................................................................................... 77
4.7.2 Archive protection ......................................................................................................................................... 78
4.7.3 Backup cataloging ......................................................................................................................................... 79
4.7.4 Backup performance ..................................................................................................................................... 79
4.7.5 Backup splitting ............................................................................................................................................. 81
4.7.6 Compression level ......................................................................................................................................... 82
4.7.7 Disaster recovery plan (DRP) ........................................................................................................................ 82
4.7.8 E-mail notifications ........................................................................................................................................ 83
4.7.9 Error handling ................................................................................................................................................ 84
4.7.10 Event tracing .................................................................................................................................................. 85
4.7.11 Fast incremental/differential backup .......................................................................................................... 86
4.7.12 File-level backup snapshot ........................................................................................................................... 87
4.7.13 File-level security ........................................................................................................................................... 87
4.7.14 Media components ....................................................................................................................................... 88
4.7.15 Mount points ................................................................................................................................................. 88
4.7.16 Multi-volume snapshot ................................................................................................................................. 89
4.7.17 Pre/Post commands ...................................................................................................................................... 89
4.7.18 Pre/Post data capture commands ............................................................................................................... 91
4.7.19 Replication/cleanup inactivity time ............................................................................................................. 93
4.7.20 Sector-by-sector backup ............................................................................................................................... 93
4.7.21 Task failure handling ..................................................................................................................................... 93
4.7.22 Task start conditions ..................................................................................................................................... 94
4.7.23 Volume Shadow Copy Service ...................................................................................................................... 95
5 Recovery ....................................................................................................................... 98
5.1 Creating a recovery task ..........................................................................................................98
5.1.1 What to recover ............................................................................................................................................ 99
5.1.2 Access credentials for location ................................................................................................................... 102
5.1.3 Access credentials for destination ............................................................................................................. 103
5.1.4 Where to recover ........................................................................................................................................ 103
5.1.5 When to recover ......................................................................................................................................... 111
5.1.6 Task credentials ........................................................................................................................................... 111
5.2 Recovering BIOS-based systems to UEFI-based and vice versa .............................................111
5.2.1 Recovering volumes .................................................................................................................................... 112
5.2.2 Recovering disks .......................................................................................................................................... 113
5.3 Acronis Active Restore ...........................................................................................................115
5.4 Bootability troubleshooting ...................................................................................................117