User manual ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER. We hope that this ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER user guide will be useful to you.


ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER : Download the complete user guide (3262 Ko)

You may also download the following manuals related to this product:

   ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER BROCHURE (393 ko)
   ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER DATA SHEET (393 ko)
   ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER QUICK START GUIDE (214 ko)
   ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER INSTALLATION GUIDE (386 ko)
   ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER COMMAND LINE REFERENCE (402 ko)

Manual abstract: user guide ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER

Detailed instructions for use are in the User's Guide.

[. . . ] Acronis® Backup & RecoveryTM 10 Advanced Server User's Guide Copyright © Acronis, Inc. , 2000-2010. "Acronis" and "Acronis Secure Zone" are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", "Acronis Startup Recovery Manager", "Acronis Active Restore" and the Acronis logo are trademarks of Acronis, Inc. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. [. . . ] In order to recover your operating system, you have to perform a disk backup. Use the table in the right part of the window to browse and select the nested items. Selecting the check box beside the Name column's header automatically selects all items in the table. Click OK. 196 Copyright © Acronis, Inc. , 2000-2010 6. 2. 5 Access credentials for source Specify the credentials required for access to the data you are going to backup. To specify credentials 1. Select one of the following: Use the plan's credentials The program will access the source data using the credentials of the backup plan account specified in the General section. Use the following credentials The program will access the source data using the credentials you specify. Use this option if the plan's account does not have access permissions to the data. When entering the name of an Active Directory user account, be sure to also specify the domain name (DOMAIN\Username or Username@domain) Password. Click OK. 6. 2. 6 Exclusions Set up exclusions for the specific types of files you do not wish to back up. For example, you may not want database, hidden and system files and folders, as well as files with specific extensions, to be stored in the archive. To specify which files and folders to exclude: Set up any of the following parameters: Exclude all hidden files and folders Select this check box to skip files and folders with the Hidden attribute. If a folder is Hidden, all of its contents -- including files that are not Hidden -- will be excluded. Exclude all system files and folders Select this check box to skip files and folders with the System attribute. If a folder is System, all of its contents -- including files that are not System -- will be excluded. You can view file or folder attributes in the file/folder properties or by using the attrib command. For more information, refer to the Help and Support Center in Windows. Exclude files matching the following criteria Select this check box to skip files whose names match any of the criteria -- called file masks -- in the list; use the Add, Edit, Remove and Remove All buttons to create the list of file masks. in a file mask: The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask Doc*. txt yields files such as Doc. txt and Document. txt The question mark (?) substitutes for exactly one character in a file name; for example, the file mask Doc?. txt yields files such as Doc1. txt and Docs. txt -- but not the files Doc. txt or Doc11. txt Copyright © Acronis, Inc. , 2000-2010 197 Exclusion examples Criterion By name By path Mask (*) Mask (?) Example File1. log C:\Finance\test. log *. log my???. log Description Excludes all files named File1. log. Excludes the file named test. log located in the folder C:\Finance Excludes all files with the . log extension. Excludes all . log files with names consisting of five symbols and starting with "my". 6. 2. 7 Archive Specify where the archive will be stored and the name of the archive. 1. Selecting the destination Enter the full path to the destination in the Path field, or select the desired destination in the folders tree. To back up data to a centralized vault, expand the Centralized group and click the vault. To back up data to a personal vault, expand the Personal group and click the vault. To back up data to a local folder on the machine, expand the Local folders group and click the required folder. To back up data to a network share, expand the Network folders group, select the required networked machine and, then click the shared folder. If the network share requires access credentials, the program will ask for them. Note for Linux users: To specify a Common Internet File System (CIFS) network share which is mounted on a mount point such as /mnt/share, select this mount point instead of the network share itself. To back up data to an FTP or SFTP server, type the server name or address in the Path field as follows: ftp://ftp_server:port _number or sftp://sftp_server:port number If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP. After entering access credentials, the folders on the server become available. [. . . ] 363) aimed to maintain the optimal balance between a backup archive (p. 369) scheme that has only three levels of recovery resolution (daily, weekly, monthly resolution), the Tower of Hanoi scheme continuously reduces the time interval between recovery points as the backup age increases. For more information please refer to "Tower of Hanoi backup scheme (p. 37)". U Universal Restore (Acronis Backup & Recovery 10 Universal Restore) The Acronis proprietary technology that helps boot up Windows on dissimilar hardware or a virtual machine. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ACRONIS BACKUP RECOVERY 10 ADVANCED SERVER will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.