Acronis Backup & Recovery 10 Advanced Workstation TIDLBPDES5 Manual De Usuario

Los códigos de productos
TIDLBPDES5
Descargar
Página de 360
 
816307 Best practices for using dynamic disks on Windows Server 2003-based computers  
http://support.microsoft.com/kb/816307 
 
Dynamic group 
A group of machines (p. 347) which is populated automatically by the management server (p. 348) 
according to membership criteria specified by the administrator. Acronis Backup & Recovery 10 offers 
the following membership criteria:  
• 
Operating system 
• 
Active Directory organization unit 
• 
IP address range. 
A machine remains in a dynamic group as long as the machine meets the group's criteria. The 
machine is removed from the group automatically as soon as  
• 
the machine's properties change so that the machine does not meet the criteria anymore OR 
• 
the administrator changes the criteria so that the machine does not meet them anymore. 
There is no way to remove a machine from a dynamic group manually except for deleting the 
machine from the management server. 
 
 
Dynamic volume 
Any volume located on dynamic disks (p. 345), or more precisely, on a disk group (p. 344). Dynamic 
volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired 
goal: 
• 
to increase the volume size (a spanned volume) 
• 
to reduce the access time (a striped volume) 
• 
to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.)  
 
Encrypted archive 
A backup archive (p. 339) encrypted according to the Advanced Encryption Standard (AES). When the 
encryption option and a password for the archive are set in the backup options (p. 340), each backup 
belonging to the archive is encrypted by the agent (p. 339) before saving the backup to its 
destination.  
The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a 
randomly generated key with a user-defined size of 128, 192 or 256 bits. The encryption key is then 
encrypted with AES-256 using a SHA-256 hash of the password as a key. The password itself is not 
stored anywhere on the disk or in the backup file; the password hash is used for verification 
purposes. With this two-level security, the backup data is protected from any unauthorized access, 
but recovering a lost password is not possible. 
 
346
 
Copyright © Acronis, Inc., 2000-2009