Skip to end of metadata
Go to start of metadata

Some changes in terminology have occured since CDP 2.0. See the table below.

CDP 2 CDP 3 CDP 3 Short-hand
Backup Task Data Protection Policy Policy
Backup Replication Replica, Replicate, Synchronize, Sync
Delete Backup / Delete Recovery Point Merge Recovery Points Merge
Job/Task Policy  

Advanced Edition

See Advanced Edition.


Agents are computers and servers that are being replicated. Multiple Agents can be managed within the Enterprise CDP. See: CDP Agents.


CDP system generates warning alerts to inform users that the current course of action could be in some way dangerous or detrimental.


An application programming interface (API) is an interface implemented by a software program that enables it to interact with other software. There is a list of CDP API provided by R1Soft. See API Documentation.

Archive Point

An Archive Point is basically a copy of the most recent Recovery Point, which can be used for long term data storage to provide further integrity and safe-keeping of data. It supports all of the Recovery Points' functionality. You can browse and restore your files as well as perform a Bare-Metal Restore. See Archiving.


Refers to advanced recovery point archiving rules available in CDP. This process involves archiving the most recently available recovery point as configured on a daily/weekly/monthly basis for long term storage. See Archiving.

Bare Metal

A new computer system that does not contain an operating system or any software.

Bare-Metal Restore

Bare-Metal Restore is the process of instantly rebuilding a computer or server from scratch after a catastrophic failure. The CDP application allows to restore servers directly from disk-based backup. There is no need to first partition your drive and install the operating system. Instead, you use the Bare-Metal Restore process built directly into the CDP Server. See: Bare-Metal Restore.


The file system of every operating system divides the hard disk into groups of bytes called blocks. Block-based backup application reads the data from these blocks. Compared to backup applications that read every file using file system, which is slow and time consuming process, block based backups are more efficient.


Compression is the reduction in size of data in order to save disk space or transmission time. There are three types of compression in CDP: None, Zlib or QuickLZ.

Control Panel Instance

Control Panel Instance is an occurrence of a Hosting Control Panel (a certain installation on the machine where the CDP Agent is installed.) The Instance must be added to the Policy. For each Instance, you need to specify Control Panel Type, Name, Description, and Virtuozzo Container ID (if exists). See CDP for Hosting Control Panels.


Deltas are the data that has changed since the last backup run. Various types of data can be treated as Deltas. It depends on how the backup application computes deltas. A delta could be a raw disk block, a variables length portion of a file or even a complete file depending on the method.

Disk Safe

To map the block deltas versions and Recovery Points, the block deltas database is used. This database is a Disk Safe. Disk Safe contains the data needed to restore the Device(s) of Agent. See: Disk Safes.

Enterprise Edition

See Enterprise Edition.


Moving files from a recovery point in the Disk Safe to an off-site server or local hard disk. See Copying and Moving Disk Safes.

File Excludes

File Excludes are files and folders that a user wants to excluded from replications. The system allows to define various exclude rules while customizing the settings of a replication. The user can exclude files and folders as well. See Excluding Files and Folders.

Full Block Scan

This is a particular type of CDP replication of a device. It happens under certain conditions and is required to get the asynchronous CDP replication back in sync. Usually this process takes much time and may reduce a network throughput.


Globally Unique Identifier is generated by the system. This is a unique reference number used as an identifier in computer software. The value of a GUID is represented as a 32-character string, for example 0f6b6a6e-d444-4c77-a026-f76be7723e16.

Hyper-V VHD Explorer

R1Soft Hyper-V VHD Explorer allows you to mount and dismount your Hyper-V Virtual Hard Disk (VHD) files. Explorer shell integration adds right-click "Attach" and "Detach" actions to .vhd files in MS Windows Explorer. Use the Hyper-V VHD Explorer graphical user interface to manage all your mounted VHD files.

Limit Disk Space Available to CDP

This option defines how much free space can be left. This is an effective limit defined in percents of the Device volume. If the limit is reached, then the system forbids generating new Recovery Points. The replication is interrupted and failed.

Initial Replica

The first Recovery Point containing all used (except for excludes) parts of the hard disk. Subsequent synchronizations only contain Deltas.

Locking Recovery Points

Locking Recovery Points means protecting them from being merged (deleted).

Log Files

Log File is a file that lists actions that have occurred. Three types of log files are available in CDP: log file with messages from tasks performed by the backup agent (cdp.log); log file with messages from the CDP Server (server.log); log file with messages from the web GUI, and startup/shutdown tasks (monitor.log). See Accessing Log Files.

Merge Recovery Points

The process of deleting a Recovery Point is actually a merge between the unwanted recovery point and closest existing recovery point. Deltas that have changed between the two Recovery Points can be discarded and the space they consume in the Disk Safe freed. See Merging Recovery Points.

Mount Point

In Unix-like systems, a mount point is the location in the operating system's directory structure where a mounted file system appears. In Microsoft Windows, mapping a drive is the equivalent to mount point.

Multi-Point Replication

Multi-Point Replication is a function built-in CDP Enterprise Edition. It allows a secondary replicationof your CDP Enterprise Server machine. As the primary CDP Server itself could potentially crash due to hardware failure, virus attack, etc., you can run another CDP Server enabling you to protect the machine with your primary CDP Server installed. Using Multi-Point Replication function, you can replicate your primary CDP Enterprise Server machine by a secondary CDP Enterprise Server. See Multi-Point Replication.


MySQL is a database software with a variety of tools providing multi-user access to a number of databases. The CDP system allows to backup and restore MySQL databases. See CDP for MySQL.


Partition as an action means to divide memory or mass storage into isolated sections. The Partitions are specific areas within the hard disk. Partition Table is a placeholder for the description of a Partition on the hard disk.

Policy (Data Protection Policy)

Policy is assigned to a Disk Safe. It is a schedule of Disk Safe replication. You can schedule recurring Policies or create one-time Policies. The Policy starts at the time you have specified in the Policy properties. The Policy properties include information about how may Recovery Points to keep in the Disk Safe. See Policies.

Policy Frequency

Recurrence selected for running the Policy (On Demand, Minutely, Hourly, Daily, Weekly, Monthly, or Yearly)

Recovery Point Retention

The rules that define how many Recovery Points to keep in the Disk Safe. Old Recovery Points are merged.

Recovery Point

A Recovery Point is a set of many deltas. Deltas represent the state of a disk volume block at a particular point in time. Each delta can be used by one or more Recovery Point. The relationship between Deltas and Recovery Points is maintained by the Disk Safe. See: Recovery Points.

Recovery Point Limit

The limit indicates how many Recovery Points will be kept. The old Recovery Points will be merged automatically.


The operation of copying block level Deltas from the Agent to the CDP Server into a new Recovery Point. Each replication creates a point-in-time image (a Recovery Point) of the Device.

Server Key

In order to keep the CDP Agent secure, connections are only accepted from specified CDP Servers. To specify it, you need to add Server Public Key to the CDP Agent. It means creating a text file on the Agent machine. See Adding the Server Key to Linux Agent, Adding the Server Key to Windows Agent.

Snapshot the Disk or Volume

This is the first stage of replication process. The system creates a point-in-time snapshot of the servers file system for a consistent open file backup.

Warn When Disk Usage Exceeds

This is a warning level where users are informed they are close to reaching their effective limit. The level is also defined in percents of the Device volume. This limit is usually a lesser value to Limit Disk Space Available to CDP.

Standard Edition

See Standard Edition.


Synchronization is the process of creation of the Disk Safe point-in-time snapshot and computing Deltas based on the last completed synchronization.

Vacuuming Disk Safes

Vacuuming Disk Safe is the process of reducing of the on-disk size. It is achieved by vacuuming Blocks which are not longer used by a file system.


Virtual Hard Disk (VHD) is typically used as a hard disk of a virtual machine. It allows you to deploy multiple operating systems on a single host machine. On the market, there are pre-configured VHDs with already installed software. Such VHDs enable you to evaluate different software solutions in your own environment without the need for dedicated servers or complex installations. Use the Hyper-V VHD Explorer graphical user interface to manage all your mounted VHD files.


Volume is a storage of one or more Disk Safes. Volumes are so-called containers in the Replication system. See: Volumes.

enterprise_edition enterprise_edition Delete
advanced_edition advanced_edition Delete
standard_edition standard_edition Delete
glossary glossary Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.