284421
6
Zoom out
Zoom in
Previous page
1/201
Next page
13.4 Examples of backup scheduling scenarios ............................................................................ 116
13.4.1 Full backups with automatic deletion on quota violation ........................................................................ 116
13.4.2 Full backups with automatic deletion when backup storage is filled ...................................................... 117
13.4.3 Full backups to Acronis Secure Zone with automatic deletion ................................................................ 117
13.4.4 Full + incremental/differential backups with automatic rotation ............................................................ 118
14 Managing Acronis Secure Zone .......................................................................................... 120
14.1 Creating Acronis Secure Zone ............................................................................................... 120
14.2 Resizing Acronis Secure Zone ................................................................................................ 122
14.3 Changing password for Acronis Secure Zone ........................................................................ 123
14.4 Deleting Acronis Secure Zone ............................................................................................... 123
15 Creating bootable media ................................................................................................... 124
15.1 Creating Linux-based rescue media ...................................................................................... 124
15.2 Creating BartPE disc with Acronis True Image Home ........................................................... 126
15.3 Creating WinPE-based rescue media .................................................................................... 128
15.3.1 Adding the Acronis Plug-in to WinPE 1.x ................................................................................................... 129
15.3.2 Adding the Acronis Plug-in to WinPE 2.x or 3.0 ......................................................................................... 129
16 Working with vhd files ...................................................................................................... 132
16.1 Converting tib images into vhd virtual disks and vice versa ................................................. 132
16.1.1 Converting to Windows backup ................................................................................................................. 132
16.1.2 Converting to Acronis backup ..................................................................................................................... 133
16.2 Recovery using vhd files created by Windows Backup ......................................................... 134
16.3 Booting from a tib image of your Windows 7 system partition............................................ 134
16.4 Acronis Boot Sequence Manager .......................................................................................... 135
17 Exploring archives and mounting images ........................................................................... 136
17.1 Mounting an image ............................................................................................................... 136
17.2 Unmounting an image ........................................................................................................... 139
18 Searching backup archives and their content ..................................................................... 140
18.1 Searching ............................................................................................................................... 140
18.2 Windows Search and Google Desktop integration ............................................................... 141
18.2.1 Using Google Desktop with Acronis True Image Home ............................................................................ 142
18.2.2 Using Windows Search with Acronis True Image Home .......................................................................... 145
19 Other operations ............................................................................................................... 150
19.1 Validating backup archives.................................................................................................... 150
19.2 Operation results notification ............................................................................................... 151
19.2.1 E-mail notification ........................................................................................................................................ 151
19.2.2 WinPopup notification ................................................................................................................................ 152
19.3 Viewing Tasks and Logs ......................................................................................................... 153
19.4 Managing backup archives .................................................................................................... 155
19.5 Consolidating backups .......................................................................................................... 157
19.6 Removing backup archives .................................................................................................... 160
19.7 Moving backup archives ........................................................................................................ 160
6


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Acronis true image home 2010 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Acronis true image home 2010 in the language / languages: English as an attachment in your email.

The manual is 8,7 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

Others manual(s) of Acronis true image home 2010

Acronis true image home 2010 User Manual - German - 225 pages

Acronis true image home 2010 User Manual - Dutch - 232 pages


The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info