ACRONIS Backup & Recovery 11.5 Server for Windows User's Guide Page 270

  • Download
  • Add to my manuals
  • Print
  • Page
    / 275
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 269
270 Copyright © Acronis International GmbH, 2002-2012
IP address range
Listed in txt/csv file.
A machine remains in a dynamic group as long as the machine meets the group's criteria. However,
the administrator can specify exclusions and not include certain machines in the dynamic group even
if they meet the criteria.
Dynamic volume
Any volume located on dynamic disks (p. 269), or more precisely, on a disk group (p. 268). Dynamic
volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired
goal:
to increase the volume size (a spanned volume)
to reduce the access time (a striped volume)
to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.)
E
Encrypted archive
A backup archive (p. 263) encrypted according to the Advanced Encryption Standard (AES). When the
encryption option and a password for the archive are set in the backup options (p. 264), each backup
belonging to the archive is encrypted by the agent (p. 263) before saving the backup to its
destination.
Encrypted vault
A managed vault (p. 272) to which anything written is encrypted and anything read is decrypted
transparently by the storage node (p. 274), using a vault-specific encryption key stored on the node.
In case the storage medium is stolen or accessed by an unauthorized person, the malefactor will not
be able to decrypt the vault contents without access to the storage node. Encrypted archives (p. 270)
will be encrypted over the encryption performed by the agent (p. 263).
Export
An operation that creates a copy of an archive (p. 263) or a self-sufficient part copy of an archive in
the location you specify. The export operation can be applied to a single archive, a single backup (p.
263) or to your choice of backups belonging to the same archive. An entire vault (p. 275) can be
exported by using the command line interface.
F
Full backup
A self-sufficient backup (p. 263) containing all data chosen for backup. You do not need access to any
other backup to recover the data from a full backup.
Page view 269

Comments to this Manuals

No comments