Acronis Backup & Recovery 10 Advanced Workstation TIDLBPDES5 Manual De Usuario

Los códigos de productos
TIDLBPDES5
Descargar
Página de 360
 
To specify credentials 
1.  Select one of the following: 
o
 
Use the task credentials 
The program will access the location using the credentials of the task account specified in the 
General section. 
o
 
Use the following credentials 
The program will access the location using the credentials you specify. Use this option if the 
task account does not have access permissions to the location. You might need to provide 
special credentials for a network share or a storage node vault. 
Specify: 
• 
User name. When entering the name of an Active Directory user account, be sure to also 
specify the domain name (DOMAIN\Username or Username@domain) 
• 
Password. The password for the account. 
2.  Click OK
As appears from the original FTP specification, credentials required for access to FTP servers are transferred 
through a network as plaintext. This means that the user name and password can be intercepted by an 
eavesdropper using a packet sniffer. 
 
6.4.6.  When to validate 
As validation is a resource-intensive operation, it makes sense to schedule validation to the managed 
machine's off-peak period. On the other hand, if you prefer to be immediately informed whether the 
data is not corrupted and can be successfully recovered, consider starting validation right after the 
task creation. 
Choose one of the following: 
• 
Now - to start the validation task right after its creation, that is, after clicking OK on the Validation 
page. 
• 
Later - to start the one-time validation task, at the date and time you specify. 
Specify the appropriate parameters as follows: 
o
 
Date and time - the date and time when to start the task. 
o
 
The task will be started manually (do not schedule the task) - select this check box, if you 
wish to start the task manually later. 
• 
On schedule - to schedule the task. To learn more about how to configure the scheduling 
parameters, please see the Scheduling (p. 161) section. 
 
6.5. Mounting an image 
Mounting volumes from a disk backup (image) lets you access the volumes as though they were 
physical disks. Multiple volumes contained in the same backup can be mounted within a single mount 
operation. The mount operation is available when the console is connected to a managed machine 
running either Windows or Linux. 
Mounting volumes in the read-write mode enables you to modify the backup content, that is, save, 
move, create, delete files or folders, and run executables consisting of one file. 
234
 
Copyright © Acronis, Inc., 2000-2009