...
Anchor | ||||
---|---|---|---|---|
|
Compression
Backup files can be reduced in size without compromising data integrity. Compression results may vary depending on compressibility of the source data, e.g., a standard Windows install OS partition will compress to around 60-70% of its original size. The compression effectiveness for user data partitions and files will depend on the types of files being backed up. Files that won't compress further include most audio and video files, as well as existing compressed file such as .zip, .tar, .7z etc.
...
Anchor | ||||
---|---|---|---|---|
|
File Size
Info |
---|
Incremental Retention Rules will not be run if backup files are split. This can be caused by setting a fixed size or if the destination file system is FAT32. |
...
Anchor | ||||
---|---|---|---|---|
|
Password
Info |
---|
With the Password option turned on all the images created will require a password before they can be browsed or restored. |
...
Enter Password: | The minimum password length is determined by the selected AES encryption level. Long passwords are much more secure than shorter passwords and can easily be constructed and remembered by adding together phrases and words that are unique to your memory. Passwords are not saved to backup files. Macrium Reflect uses standard PBKDF2 key derivation functions with 260K iterations to save an irreversible hash of the password. To view existing saved passwords, click the 'eye' icon in the password edit field. After entering valid Windows Administrator credentials, the password will be shown in plain text. |
AES Encryption | |
None | No encryption and the password can be any length. |
Standard 128 Bit | This is the default and requires a password containing at least 8 characters. |
Medium 192 Bit | Requires a password containing at least 16 characters. |
High 256 Bit | Requires a password containing at least 32 characters. |
Encrypt stored passwords | Passwords are stored in backup definition files to enable unattended backups to run. Select this option to encrypt your passwords in the xml file using a steganographically hidden asymmetric key. |
...
Anchor | ||||
---|---|---|---|---|
|
Auto Verify Image
Option | Description | ||
---|---|---|---|
Verify image | Images will be verified automatically when the backup completes.
|
...
Anchor | ||||
---|---|---|---|---|
|
Retention Rules
Include Page | ||||
---|---|---|---|---|
|
...
Anchor | ||||
---|---|---|---|---|
|
Verify File System
Verify File System is used to check the integrity of the file system before a backup.
...
Anchor | ||||
---|---|---|---|---|
|
Cloning
Option | Description | ||||||||
---|---|---|---|---|---|---|---|---|---|
Perform an Intelligent Sector Copy | Only backup the sectors that are being used by data on the disk. Pagefile (pagefile.sys) and hibernation (hiberfil.sys) will be excluded. This reduces the time it takes for the clone to complete.
| ||||||||
Perform a Forensic Sector Copy | Backup every sector. This can add a significant amount of time to the backup process. |
...
Anchor | ||||
---|---|---|---|---|
|
Reparse Points
Reparse points are a feature of the NTFS file system that provides the ability to create a link to a directories which then fictions as an alias of that directory.
...
Anchor | ||||
---|---|---|---|---|
|
Backup Set Matching
The options below define the logic used for appending to an existing backup set and how retention rules are applied when selecting 'Apply retention rules to matching backup sets in the target folder' in the backup wizard.
...
Anchor | ||||
---|---|---|---|---|
|
Shutdown
Option | Description |
---|---|
Shutdown | This will Shutdown your computer after the backup is complete. A sub-option can be enabled to Force the shutdown process - All programs will be forced to close without being queried. |
Hibernate | This will Hibernate your computer after the backup is complete |
Suspend | This will put your computer to Sleep after the backup is complete. |
...