ACRONIS Backup & Recovery 10 Advanced Server, UR, AAS, RNW, L2, 500-1249u, FRE User's Guide Page 324

  • Download
  • Add to my manuals
  • Print
  • Page
    / 402
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 323
324 Copyright © Acronis, Inc., 2000-2010
7.1.7.3 Centralized log entry details
Displays detailed information on the log entry you have selected and lets you copy the details to the
clipboard.
To copy the details, click the Copy to clipboard button.
Log entry data fields
A centralized log entry contains the following data fields:
Type - Type of event (Error; Warning; Information)
Date - Date and time when the event took place
Policy - The backup policy the event relates to (if any)
Task - The task the event relates to (if any)
Managed entity type - Type of managed entity where the event has occurred (if any)
Managed entity - The name of the managed entity where the event has occurred (if any)
Machine - The name of the machine where the event has occurred (if any)
Code - Blank or the program error code if the event type is error. Error code is an integer number
that may be used by Acronis support service to solve the problem.
Module - Blank or the number of program module where an error was occurred. It is an integer
number that may be used by Acronis support service to solve the problem.
Owner - User name of the policy/backup plan owner (p. 32)
Message - The event text description.
The log entry's details that you copy will have the following appearance:
---------------------------Log Entry Details---------------------------
Type: Information
Date and time: DD.MM.YYYY HH:MM:SS
Backup plan: Backup plan name
Task: Task name
Managed entity type: Machine
Managed entity: ENTITY_NAME
Machine: MACHINE_NAME
Message:
Description of the operation
Code: 12(3x45678A)
Module: Module name
Owner: Owner of the plan
-----------------------------------------------------------------------
7.1.8 Reporting
Reporting provides the management server administrator with detailed and well-structured
information concerning the enterprise data protection operations. Reports can be used as an
instrument for profound analysis of the whole backup infrastructure within a corporate network.
The management server generates reports using statistics and logs which are collected from
registered machines and are stored in the dedicated databases.
Reports are generated based on report templates. The templates define the information to be
included in the report and the way the information is represented.
Page view 323
1 2 ... 319 320 321 322 323 324 325 326 327 328 329 ... 401 402

Comments to this Manuals

No comments