User manual

Table Of Contents
268 Copyright © Acronis International GmbH, 2002-2016
Registered machine
A machine (p. 266) managed by a management server (p. 267). A machine can be registered on only
one management server at a time. A machine becomes registered as a result of the registration (p.
268) procedure.
Registration
A procedure that adds a managed machine (p. 266) to a management server (p. 267).
Registration sets up a trust relationship between the agent (p. 258) residing on the machine and the
server. During registration, the console retrieves the management server's client certificate and
passes it to the agent which uses it later to authenticate clients attempting to connect. This helps
prevent any attempts by network attackers from establishing a fake connection on behalf of a
trusted principal (the management server).
Replenishable pool
A tape pool that is allowed to take tapes from the Free tapes pool when required.
Replication
Copying a backup (p. 258) to another location. By default, the backup is copied immediately after
creation. A user has the option to postpone copying the backup by setting up replication inactivity
time.
This feature replaces and enhances the dual destination backup feature, which was available in
Acronis Backup & Recovery 10.
Retention rules
A part of backup plan (p. 258) that specifies when and how to delete or move the backups (p. 258)
created by the plan.
S
Single-pass backup
A single-pass backup (aka application-aware backup) is a disk backup containing metadata of
VSS-aware applications that are present on the disk. This metadata enables browsing and recovery of
the backed-up application data without recovering the entire disk or volume.
Static group
A group of machines which a management server (p. 267) administrator populates by manually
adding machines to the group. A machine remains in a static group until the administrator removes it
from the group or from the management server.
Storage node (Acronis Backup Storage Node)
A server aimed to optimize usage of various resources required for protection of enterprise data. This
goal is achieved by organizing managed vaults (p. 266). Storage Node enables the administrator to:
use a single centralized catalog (p. 261) of data stored in the managed vaults