Encryption, 5 backup type substitution, 6 bandwidth throttling – Acronis Recovery for Microsoft Exchange - User Guide User Manual

Page 47: 7 additional settings

Advertising
background image

Please keep in mind that in the Restore Data wizard, Acronis Recovery for MS
Exchange will ask for a password after you select a folder within the archive location.
Only those archives that were protected with the password you typed in or non
password-protected archives will be displayed. Best practices suggest using the same
password for backup archives in the same folder within the archive location.

Encryption

After setting a password, you can choose to encrypt the backup with an industry-
standard AES cryptographic algorithm for advanced security.
To set up backup encryption, select one of the following encryption types:

None – backups will not be encrypted
AES 128 – the quickest encryption method available (set by default)
AES 192 – encryption will take longer than 128-bit, but is more secure
AES 256 – requires the most amount of time to cipher, but it is also the

most secure setting available

5.4.5 Backup Type Substitution

You need to create full backup of data before creating an incremental one. If for some
reason a full backup does not exist, you will need to create a full backup independently
of the backup strategy you have configured.
Specify the schedule of creating backups so that a full backup will be created first (see
Chapter 9 “Scheduling Tasks” for detailed information), or select the check box If
creation of a selected type of backup failed, try to create a full backup
.

5.4.6 Bandwidth Throttling

You can limit the bandwidth used by the backup process so that network resources will
be available for other processes.
To set the desired data transfer speed, check the Enable bandwidth throttling
parameter. Select a maximum bandwidth value from the drop-down list or enter a
value manually.

5.4.7 Additional Settings

1. Validate backup once it has been created
When enabled, the program will verify the integrity of the archive immediately after it
is created.

To validate the archive data integrity you must have all of the backups in the
series (full and incremental backups) available in the same location. If any of
the successive backups are missing, validation will not be possible.

2. Backup metadata

47

Advertising