User's Manual
Table Of Contents
- 1 Introduction
- 1.1 What is Acronis® True Image™?
- 1.2 New in this version
- 1.3 Backups created in Acronis True Image 2020 or later
- 1.4 System requirements and supported media
- 1.5 Installing Acronis True Image 2021
- 1.6 Activating Acronis True Image 2021
- 1.7 Trial version information
- 1.8 Upgrading Acronis True Image 2021
- 1.9 Technical Support
- 2 Getting started
- 3 Basic concepts
- 3.1 Basic concepts
- 3.2 The difference between file backups and disk/partition images
- 3.3 Full, incremental and differential backups
- 3.4 Deciding where to store your backups
- 3.5 Using Acronis Nonstop Backup
- 3.6 Backup file naming
- 3.7 Integration with Windows
- 3.8 Wizards
- 3.9 FAQ about backup, recovery and cloning
- 4 Backing up data
- 4.1 Backing up disks and partitions
- 4.2 Backing up files and folders
- 4.3 Backing up mobile devices
- 4.4 Backing up Office 365 data
- 4.5 Backup options
- 4.5.1 Scheduling
- 4.5.2 Backup schemes
- 4.5.3 Notifications for backup operation
- 4.5.4 Excluding items from backup
- 4.5.5 Image creation mode
- 4.5.6 Backup protection
- 4.5.7 Pre/Post commands for backup
- 4.5.8 Backup splitting
- 4.5.9 Backup validation option
- 4.5.10 Backup reserve copy
- 4.5.11 Removable media settings
- 4.5.12 Error handling
- 4.5.13 File-level security settings for backup
- 4.5.14 Computer shutdown
- 4.5.15 Online backup protection
- 4.5.16 Performance of backup operation
- 4.5.17 Selecting a data center for backup
- 4.5.18 Laptop power settings
- 4.5.19 Wi-Fi networks for backup to Acronis Cloud
- 4.6 Operations with backups
- 4.6.1 Backup operations menu
- 4.6.2 Backup activity and statistics
- 4.6.3 Sorting backups in the list
- 4.6.4 Replicating backups to Acronis Cloud
- 4.6.5 Validating backups
- 4.6.6 Backup to various places
- 4.6.7 Adding an existing backup to the list
- 4.6.8 Notarized backup
- 4.6.9 Cleaning up backups, backup versions, and replicas
- 4.6.10 Cleaning up space on Acronis Cloud
- 4.6.11 Removing data from Acronis Cloud
- 5 Recovering data
- 5.1 Recovering disks and partitions
- 5.2 Recovering files and folders
- 5.3 Searching backup content
- 5.4 Recovering Office 365 data
- 5.5 Recovery options
- 6 Archiving data
- 7 Sharing data
- 8 Protecting family data
- 9 Antivirus and antimalware protection
- 10 Vulnerability assessment
- 11 Synchronizing data
- 12 Disk cloning and migration
- 13 Tools
- 13.1 Acronis Media Builder
- 13.2 Making sure that your bootable media can be used when needed
- 13.3 Acronis Startup Recovery Manager
- 13.4 Try&Decide
- 13.5 Acronis Secure Zone
- 13.6 Adding a new hard disk
- 13.7 Security and Privacy Tools
- 13.8 Mounting an image
- 13.9 Unmounting an image
- 13.10 Working with .vhd(x) files
- 13.11 Importing and exporting backup settings
- 13.12 Acronis Universal Restore
- 14 Troubleshooting
- 15 Glossary of Terms
- Acronis Active Protection
- Acronis Drive
- Acronis Notary
- Acronis Secure Zone
- Acronis Startup Recovery Manager
- Archive
- Archiving operation
- Backup
- Backup operation
- Backup settings
- Backup version
- Backup version chain
- Bootable media
- Data synchronization
- Differential backup
- Differential backup version
- Disk backup (Image)
- Full backup
- Full backup version
- Image
- Incremental backup
- Incremental backup version
- Mobile backup
- Nonstop backup
- Nonstop protection
- Notarization
- Notarized backup
- Notarized file
- Online backup
- Recovery
- Suspicious process
- Sync
- Validation
- Version of synced file
4 Copyright © Acronis International GmbH, 2003-2020
5.3 Searching backup content .....................................................................................................105
5.4 Recovering Office 365 data ....................................................................................................106
5.5 Recovery options ...................................................................................................................107
5.5.1 Disk recovery mode .................................................................................................................................... 107
5.5.2 Pre/Post commands for recovery .............................................................................................................. 108
5.5.3 Validation option ......................................................................................................................................... 108
5.5.4 Computer restart ......................................................................................................................................... 108
5.5.5 File recovery options ................................................................................................................................... 109
5.5.6 Overwrite file options ................................................................................................................................. 109
5.5.7 Performance of recovery operation .......................................................................................................... 109
5.5.8 Notifications for recovery operation ......................................................................................................... 110
6 Archiving data.............................................................................................................. 112
6.1 What is data archiving? .........................................................................................................112
6.2 What is excluded from archives? ...........................................................................................113
6.3 Cloud archiving vs. Online backup .........................................................................................113
6.4 Archiving your data ................................................................................................................114
6.4.1 Data archiving options ................................................................................................................................ 114
6.5 Accessing your archived files .................................................................................................115
7 Sharing data ................................................................................................................ 115
8 Protecting family data .................................................................................................. 117
8.1 What is family data protection? ............................................................................................117
8.2 Adding a new device to Online Dashboard............................................................................117
8.3 Backing up data remotely ......................................................................................................118
8.4 Recovering data with Online Dashboard ...............................................................................119
8.5 Email notifications .................................................................................................................119
9 Antivirus and antimalware protection .......................................................................... 121
9.1 Active protection ...................................................................................................................122
9.1.1 Configuring Active Protection .................................................................................................................... 124
9.2 Antivirus scans .......................................................................................................................125
9.2.1 Configuring Antivirus scans ........................................................................................................................ 126
10 Vulnerability assessment ............................................................................................. 127
10.1 Managing detected issues .....................................................................................................128
10.2 Managing files in Quarantine ................................................................................................128
10.3 Configuring Protection exclusions .........................................................................................128
10.4 Protection for Zoom, Cisco Webex, and Microsoft Teams ....................................................129
10.5 Downloading Protection updates ..........................................................................................129
11 Synchronizing data ....................................................................................................... 130
11.1 About the Sync feature ..........................................................................................................130
11.2 What you can and cannot synchronize ..................................................................................130
11.3 Sync icons ...............................................................................................................................131
11.4 Creating a sync .......................................................................................................................132