User's Manual
Table Of Contents
- 1 Introduction
- 1.1 What is Acronis® True Image™?
- 1.2 New in this version
- 1.3 Backups created in Acronis True Image 2020 or later
- 1.4 System requirements and supported media
- 1.5 Installing Acronis True Image 2021
- 1.6 Activating Acronis True Image 2021
- 1.7 Trial version information
- 1.8 Upgrading Acronis True Image 2021
- 1.9 Technical Support
- 2 Getting started
- 3 Basic concepts
- 3.1 Basic concepts
- 3.2 The difference between file backups and disk/partition images
- 3.3 Full, incremental and differential backups
- 3.4 Deciding where to store your backups
- 3.5 Using Acronis Nonstop Backup
- 3.6 Backup file naming
- 3.7 Integration with Windows
- 3.8 Wizards
- 3.9 FAQ about backup, recovery and cloning
- 4 Backing up data
- 4.1 Backing up disks and partitions
- 4.2 Backing up files and folders
- 4.3 Backing up mobile devices
- 4.4 Backing up Office 365 data
- 4.5 Backup options
- 4.5.1 Scheduling
- 4.5.2 Backup schemes
- 4.5.3 Notifications for backup operation
- 4.5.4 Excluding items from backup
- 4.5.5 Image creation mode
- 4.5.6 Backup protection
- 4.5.7 Pre/Post commands for backup
- 4.5.8 Backup splitting
- 4.5.9 Backup validation option
- 4.5.10 Backup reserve copy
- 4.5.11 Removable media settings
- 4.5.12 Error handling
- 4.5.13 File-level security settings for backup
- 4.5.14 Computer shutdown
- 4.5.15 Online backup protection
- 4.5.16 Performance of backup operation
- 4.5.17 Selecting a data center for backup
- 4.5.18 Laptop power settings
- 4.5.19 Wi-Fi networks for backup to Acronis Cloud
- 4.6 Operations with backups
- 4.6.1 Backup operations menu
- 4.6.2 Backup activity and statistics
- 4.6.3 Sorting backups in the list
- 4.6.4 Replicating backups to Acronis Cloud
- 4.6.5 Validating backups
- 4.6.6 Backup to various places
- 4.6.7 Adding an existing backup to the list
- 4.6.8 Notarized backup
- 4.6.9 Cleaning up backups, backup versions, and replicas
- 4.6.10 Cleaning up space on Acronis Cloud
- 4.6.11 Removing data from Acronis Cloud
- 5 Recovering data
- 5.1 Recovering disks and partitions
- 5.2 Recovering files and folders
- 5.3 Searching backup content
- 5.4 Recovering Office 365 data
- 5.5 Recovery options
- 6 Archiving data
- 7 Sharing data
- 8 Protecting family data
- 9 Antivirus and antimalware protection
- 10 Vulnerability assessment
- 11 Synchronizing data
- 12 Disk cloning and migration
- 13 Tools
- 13.1 Acronis Media Builder
- 13.2 Making sure that your bootable media can be used when needed
- 13.3 Acronis Startup Recovery Manager
- 13.4 Try&Decide
- 13.5 Acronis Secure Zone
- 13.6 Adding a new hard disk
- 13.7 Security and Privacy Tools
- 13.8 Mounting an image
- 13.9 Unmounting an image
- 13.10 Working with .vhd(x) files
- 13.11 Importing and exporting backup settings
- 13.12 Acronis Universal Restore
- 14 Troubleshooting
- 15 Glossary of Terms
- Acronis Active Protection
- Acronis Drive
- Acronis Notary
- Acronis Secure Zone
- Acronis Startup Recovery Manager
- Archive
- Archiving operation
- Backup
- Backup operation
- Backup settings
- Backup version
- Backup version chain
- Bootable media
- Data synchronization
- Differential backup
- Differential backup version
- Disk backup (Image)
- Full backup
- Full backup version
- Image
- Incremental backup
- Incremental backup version
- Mobile backup
- Nonstop backup
- Nonstop protection
- Notarization
- Notarized backup
- Notarized file
- Online backup
- Recovery
- Suspicious process
- Sync
- Validation
- Version of synced file
195 Copyright © Acronis International GmbH, 2003-2020
O
Online backup
Online backup - a backup that is created using
Acronis Online Backup. Online backups are
stored in a special storage named Acronis
Cloud, accessible over the Internet. The main
advantage of an online backup is that all
backups are stored on the remote location. It
gives a guarantee that all backed up data will
be safe independently of a user local storages.
To begin to use Acronis Cloud a user should
subscribe to the service.
R
Recovery
Recovery is a process of returning of a
corrupted data to a previous normal state
from a backup (p. 193).
S
Suspicious process
Acronis Active Protection (p. 192) uses
behavioral heuristics and analyzes chains of
actions done by a program (a process), which
is then compared with the chain of events in a
database of malicious behavior patterns. If the
program acts similar to ransomware behavior
and tries to modify a user's files, it is
considered as suspicious.
Sync
1. The same as Data synchronization (p.
193).
2. Sync settings which were configured on
the sync owner's computer. A created
sync is managed using the corresponding
sync box. Sync creation does not mean
start of sync process. Other users may join
a created sync.
V
Validation
An operation that checks whether you will be
able to recover data from a particular backup
version (p. 193).
When you select for validation…
a full backup version (p. 194) - the
program validates the full backup version
only.
a differential backup version (p. 193) - the
program validates the initial full backup
version and the selected differential
backup version.
an incremental backup version (p. 194) -
the program validates the initial full
backup version, the selected incremental
backup version, and the whole chain (if
any) of backup versions to the selected
incremental backup version. If the chain
contains one or more differential backup
versions, the program validates (in
addition to the initial full backup version
and the selected incremental backup
version) only the most recent differential
backup version in the chain and all
subsequent incremental backup versions
(if any) between the differential backup
version and the selected incremental
backup version.
Version of synced file
A state of a file which is located in a sync
folder after each modification of this file. File
versions may be stored on Acronis Cloud.