Skip to end of metadata
Go to start of metadata


Server Backup generates warning alerts to inform users that the current course of action could be dangerous or detrimental in some way.


An application programming interface (API) is an interface implemented by a software program that enables the program to interact with other software. For more information about the Server Backup API, see Use the Server Backup API.

archive point

An archive point is a copy of a recovery point, which is used for long-term data storage to provide further integrity and safe keeping of data. Archive points support all functionality of the recovery point. You can browse and restore your files as well as perform a bare-metal restore.  Since an archive point will be retained longer than a local recovery point SBM may have to fetch the data before you can use it for recovery.  For more information about archive points, see Offsite Backup and Archival.


Server Backup includes advanced recovery point archiving rules. This process involves archiving recovery point snapshots  on a daily/weekly/monthly/yearly basis for long-term storage. For more information about archiving, see Offsite Backup and Archival.

Backup agent

See CDP Agent

Backup server

The Backup server is the system where backups are stored and processed for restorations.

bare metal

A bare-metal system is a new computer system that does not contain an operating system or any software.

bare-metal restore

The Server Backup bare-metal restore is the process of instantly rebuilding a computer or server from scratch after a catastrophic failure. Server Backup application allows to restore servers directly from disk-based backup. There is no need to first partition your drive and install the operating system. For more information about bare-metal restores, see Perform a bare-metal restore.


The file system of every operating system divides the hard disk into groups of bytes called blocks. A block-based backup application reads the data from these blocks. Block-based backups are more efficient than backup applications that read every file using file system, which is a slow and time consuming process.

CDP Agent

The small application that runs on protected servers and communicates with the Server Backup Manager. The CDP Agent is sometimes referred to as the Backup Agent or "cdp-agent," which is the name of the startup script on Linux.


Compression is the reduction in size of data in order to save disk space or transmission time. Server Backup uses two types of compression: Zlib or QuickLZ.

control panel instance

A control panel instance is an occurrence of a hosting control panel or certain installation on the server where the CDP Agent resides. When working with policies, you must add the instance to the policy. For each instance, specify the control panel type, name, description, and Virtuozzo Container ID if it exists. For more information about control panels instances and hosting control panels, see Hosting control panels.

data protection policy

See policy.


A delta is the data that changed since the last backup run. Various types of data are considered deltas depending on how the backup application computes deltas. You may consider a delta as a raw disk block, a variables-length portion of a file, or even a complete file depending on the method of calculation.

Disk Safe

Server Backup uses the block deltas database to map the block deltas versions and recovery points. This database is a Disk Safe. Disk Safes contain the data needed to restore the devices on a server. Note that you can also create encrypted Disk Safes. For more information about Disk Safes, see Disk Safes.


an export occurs when you move files from a recovery point in the Disk Safe to an off-site server or local hard disk. For more information about exporting a Disk Safe, see Copy or move Disk Safes.

file excludes

File excludes are files and folders that a user wants to excluded from replications. The system allows you to define various exclude rules while customizing the settings of a replication. For more information about file excludes, see Exclude files and folders.

full block scan

A full block scan is a particular type of Server Backup replication of a device. This scan occurs under certain conditions and is required to get the asynchronous replication back in sync. Not that this is a time- and resource-consuming process that may reduce network throughput.


The system generates a globally unique identifier (GUID) as a unique reference number in computer software. The value of a GUID is represented as a 32-character string, such as 0f6b6a6e-d444-4c77-a026-f76be7723e16.

Hyper-V VHD Explorer

R1Soft offers Hyper-V VHD Explorer for you to mount and dismount your Hyper-V virtual hard disk (VHD) files. Explorer shell integration adds right-click attach and detach actions to .vhd files in Microsoft Windows Explorer. Use the Hyper-V VHD Explorer as a graphical user interface to manage all your mounted VHD files. For more information about Hyper-V VHD Explorer, see the product page on the R1Soft Website at

initial replica

The first recovery point that contains all used parts of the hard disk except for excludes. Subsequent synchronizations contain only deltas.

Limit disk space available to Server Backup

Limited disk space available to Server Backup is an option that defines how much free space is left available for use by Server Backup. This is an effective limit defined in percent of the device volume. When the system reaches the set limit, you cannot generate any new recovery points. As a result, any replication stops and fails.

locking recovery points

Server Backup allows you to lock recovery points and protect them from a merge or deletion. note that when a recovery point is locked, Server Backup cannot perform the Disk Safe verification task. For more information about this task, see Schedule Disk Safe verification.

log files

A log file is a file that lists actions as they occur. Server Backup includes log files that contain messages from tasks performed by the CDP Agent (cdp.log), log files that contain messages from the Backup Manager (server.log), and log files that contain messages from the Web GUI and start up/shut down tasks (monitor.log). For more information about log files, see Access log files.

manager key

As a security precaution, CDP Agent allows connections only from specified Backup Managers. To specify a Backup Manager, add a manager public key to the CDP Agent by creating the appropriate text file on the server. For more information about encryption keys, see Add key to Linux Backup Agent and Add the key to Windows Backup Agent.

merge recovery points

When you delete a recovery point, you are actually merging the unwanted recovery point and closest existing recovery point. You can discard deltas between the two recovery points and free the space the data consumes in the Disk Safe. For more information about recovery points, see Merge recovery points.

mount point

In Unix-like systems, a mount point is the location in the operating system directory structure where a mounted file system appears. In Microsoft Windows, mapping a drive is the equivalent to a mount point.


MySQL is database software that features a variety of tools and provides multi-user access to a number of databases. Server Backup allows to back up and restore MySQL databases. For more information about Server Backup and MySQL, see Protect MySQL.


Partition as an action means to divide memory or mass storage into isolated section within the hard disk. A partition table is a placeholder for the description of a partition on the hard disk.


A policy is a schedule of Disk Safe replication and is assigned to a Disk Safe. You can create one-time policies or schedule recurring policies. Policy properties allows you to start the policy at a set time and include the number of recovery points you want to keep in the Disk Safe. For more information about using policies, see Policies.

policy frequency

Policy frequency is the recurrence selected for running the policy. You can select the policy to run:

  • On demand
  • By the minute or hour
  • Daily, weekly, monthly, or yearly

For more information about using policies, see Policies.

protected machine

A protected machine is a desktop or server that is backed up or replicated. Server Backup Manager allows you to manage backups for multiple protected machines. For more information, see Protected Machines.

recovery point

A recovery point is a set of many deltas that represent the state of a disk volume block at a particular point in time. Each delta is available for use by one or more recovery points. The Disk Safe maintains the relationship between deltas and recovery points. For more information about recovery points, see Manage recovery points.

recovery point limit or retention

Recovery point limit or retention defines how many recovery points you want to keep in the Disk Safe. Note that the system merges old recovery points. For more information about recovery points, see Manage recovery points.


Replication is the operation of copying block-level deltas from the CDP Agent to Server Backup into a new recovery point. Each replication creates a point-in-time image or recovery point of the device. For more information about replication stages, see Understand the replication stages.


SBM (Server Backup Manager) is the abbreviation used to refer to both the SBM product and the management software running on the Backup server.

snapshot the disk or volume

The first stage of replication is to create a snapshot of the disk or volume. The system creates a point-in-time snapshot of the server file system for a consistent, open file backup.


Synchronization is the process of creating the Disk Safe point-in-time snapshot and computing deltas based on the last completed synchronization. For more information about synchronization, see Policies.

vacuuming Disk Safes

Vacuuming a Disk Safe is the process of reducing the on-disk size by "vacuuming" or removing blocks that are no longer used by a file system. For more information about vacuuming, see Vacuum Disk Safes.


Virtual Hard Disk (VHD) is a file format used as a hard disk of a virtual machine. VHD allows you to deploy multiple operating systems on a single host machine. VHDs are available with software that enables you to evaluate different software solutions in your own environment without the need for dedicated servers or complex installations. The Hyper-V VHD Explorer allows you to manage all your mounted VHD files. For more information about Hyper-V VHD Explorer, see the product page on the R1Soft Website at


Volume is the storage capacity of one or more Disk Safes. Volumes are containers in the replication system. For more information about volumes, see Volumes.

Warn when disk usage exceeds

Warn when disk usage exceeds is a warning level where users are informed that they are close to reaching their effective limit. The level is also defined in percent of the device volume. This limit is usually a lesser value to the Limit disk space available to Server Backup option.

Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.