8 backup plan's credentials, Backup plan's credentials, Label (preserving machine properties in a backup) – Acronis Backup for Linux Server - User Guide User Manual

Page 52

Advertising
background image

52

Copyright © Acronis International GmbH, 2002-2014

not corrupted and can be successfully recovered, think of starting the validation right after
backup creation.

2. What to validate – select either to validate the entire archive or the latest backup in the archive.

Validation of the archive will validate all the archive’s backups and may take a long time and a lot
of system resources.
Validation of the latest backup may also take time, even if this backup is incremental or
differential, and small in size. This is because the operation validates not only the data physically
contained in the backup, but all of the data recoverable by selecting the backup. This requires
access to previously created backups.

3. Validation schedule (appears only if you have selected On schedule in step 1) - set the schedule

of validation. For more information see the Scheduling (p. 59) section.

4.2.8 Backup plan's credentials

Provide the credentials for the account under which the plan will run. By default, the plan runs under
the agent service account, if created by a user having administrative privileges on the machine. If
created by a regular user, such as a member of the Users group, the plan runs under this user's
account.

To specify credentials explicitly

1. If you have administrative privileges on the machine, select Use the following credentials.

Otherwise skip this step.

2. Specify:

User name. When entering the name of an Active Directory user account, be sure to also
specify the domain name (DOMAIN\Username or Username@domain).

Password. The password for the account.

Confirm password. Re-enter the password.

3. Click OK.

To learn more about operations available depending on the user privileges, see the Users' privileges
on a managed machine (p. 23) section.

4.2.9 Label (Preserving machine properties in a backup)

Any time data on a machine is backed up, information about the machine name, operating system,
Windows service pack and security identifier (SID) is added to the backup, along with the
user-defined text label. The label may include the department or machine owner's name or similar
information that can be used as a tag or a key.

If you recover (p. 95) the machine to a VMware ESX(i) using Agent for VMware, or convert (p. 119)
the backup to a ESX(i) virtual machine, these properties will be transferred to the virtual machine's
configuration. You can view them in the virtual machine settings: Edit settings > Options > Advanced
> General > Configuration parameters. You can select, sort and group the virtual machines with the
help of these custom parameters. This can be useful in various scenarios.

Example:

Let's assume you migrate your office or datacenter to a virtual environment. By using third-party
software that can access configuration parameters through VMware API, you can automatically apply
security policies to each machine even before powering it on.

Advertising