Retention policy defines the policies of persistent data management for meeting business data archival requirements.
When a backup job is performed, for data that are modified or deleted on the client computer, their existing version on the backup destination (backed up previously) would be moved into retention area, while newly backed up file would be placed in the current data area.
Specifically, retention policy setting defines how long are these data kept within the retention area before they are deleted permanently from the backup destination.
For backed up data that have not been updated or deleted from the client computer, they are kept in the data area on the backup destination and remain untouched.
The retention policy can be defined where retained file (in the retention area) are removed automatically after a user specific number of days or backup jobs.
Backup file permission defines whether to backup operating system file permission of the data selected as backup source.
The encryption section shows you the current encryption settings.
Encryption settings are set at a backup set's creation time, even if the password is changed afterwards, the encryption key remains the same and cannot be modified afterwards.
Encryption settings are set at a backup set's creation time and cannot be modified afterwards.
For CloudBacko Pro and Lite users, it is very important to export current configuration settings using our tools in Utilities > Export/Import Settings, the file settings.sys will be exported. Please keep the settings.sys in a safe places.
If your current backup computer has crashed and the settings.sys file is lost, you will not be able to restore the current settings including the encryption key, and the data that you backed up will be irretrievable.
For CloudBacko Home users, your hashed encryption key will be kept in our server. You don't have to export your configuration.
Field | Description |
Encryption Key | The hashed key will not be shown. Click on the "Unmask encrypting key" to show the hashed encryption key. |
Algorithm | One of the following 3 backup algorithms will be shown.
|
Method | One of the following backup method will be shown.
|
Key length | One of the following key length will be shown.
|
Once an encryption key has been defined for a backup set and the settings are saved, it cannot be changed. If you need to change the encryption key, then a new backup set will need to be created and the data backed up from scratch.
The Recycle Bin is for protection of the BAK (block) files stored in the Backup Set's destination. It allows the user to set the number of days BAK files that were deleted due to Retention Policy or Data Integrity Check will be kept in the Recycle Bin as added protection.
The Restore Drill is a routine trial restore to check for error/missing file; it will check if the file is the same as the original one saved during backup. Depending on the settings, an email may be sent to the user to let them know if there are corrupted files found so that they can run a backup to replace the corrupted files. This helps to ensure the backup data is restorable and it will allow you to find out corrupted data at an early phase.