4 Copyright © Acronis International GmbH, 2002-2015
4 Backup .......................................................................................................................... 55
4.1 Back up now .............................................................................................................................55
4.2 Creating a backup plan ............................................................................................................55
4.2.1 Selecting data to back up .............................................................................................................................. 57
4.2.2 Access credentials for source ....................................................................................................................... 59
4.2.3 Source files exclusion .................................................................................................................................... 60
4.2.4 Backup location selection ............................................................................................................................. 61
4.2.5 Access credentials for archive location ........................................................................................................ 64
4.2.6 Backup schemes ............................................................................................................................................ 65
4.2.7 Archive validation .......................................................................................................................................... 74
4.2.8 Backup plan's credentials ............................................................................................................................. 75
4.2.9 Label (Preserving machine properties in a backup) .................................................................................... 75
4.2.10 Sequence of operations in a backup plan ................................................................................................... 77
4.2.11 Why is the program asking for the password? ........................................................................................... 77
4.3 Simplified naming of backup files ............................................................................................77
4.3.1 The [DATE] variable ....................................................................................................................................... 79
4.3.2 Backup splitting and simplified file naming ................................................................................................. 79
4.3.3 Usage examples ............................................................................................................................................. 79
4.4 Scheduling ................................................................................................................................82
4.4.1 Daily schedule ................................................................................................................................................ 84
4.4.2 Weekly schedule ........................................................................................................................................... 86
4.4.3 Monthly schedule .......................................................................................................................................... 88
4.4.4 On Windows Event Log event ...................................................................................................................... 90
4.4.5 Advanced scheduling settings ...................................................................................................................... 92
4.4.6 Conditions ...................................................................................................................................................... 93
4.5 Replication and retention of backups ......................................................................................96
4.5.1 Supported locations ...................................................................................................................................... 98
4.5.2 Setting up replication of backups ................................................................................................................. 99
4.5.3 Setting up retention of backups ................................................................................................................... 99
4.5.4 Retention rules for the Custom scheme .................................................................................................... 100
4.5.5 Usage examples ........................................................................................................................................... 102
4.6 How to disable backup cataloging .........................................................................................105
4.7 Default backup options ..........................................................................................................105
4.7.1 Additional settings....................................................................................................................................... 107
4.7.2 Archive protection ....................................................................................................................................... 109
4.7.3 Backup cataloging ....................................................................................................................................... 109
4.7.4 Backup performance ................................................................................................................................... 110
4.7.5 Backup splitting ........................................................................................................................................... 111
4.7.6 Compression level ....................................................................................................................................... 112
4.7.7 Disaster recovery plan (DRP) ...................................................................................................................... 113
4.7.8 E-mail notifications ...................................................................................................................................... 114
4.7.9 Error handling .............................................................................................................................................. 115
4.7.10 Event tracing ................................................................................................................................................ 116
4.7.11 Fast incremental/differential backup ........................................................................................................ 117
4.7.12 File-level backup snapshot ......................................................................................................................... 117
4.7.13 File-level security ......................................................................................................................................... 118
4.7.14 LVM snapshotting ....................................................................................................................................... 119
4.7.15 Media components ..................................................................................................................................... 120
4.7.16 Mount points ............................................................................................................................................... 120
4.7.17 Multi-volume snapshot ............................................................................................................................... 121
4.7.18 Pre/Post commands .................................................................................................................................... 121
4.7.19 Pre/Post data capture commands ............................................................................................................. 123
4.7.20 Replication/cleanup inactivity time ........................................................................................................... 125