Skip to main content
Intronis Partner Toolkit

Glossary

The following table provides helpful definitions for some of the terms used in this knowledge base and other Intronis resources.  This list is not all-inclusive.  

 

Term

Definition

Archive Rules

Used to control the number of file revisions that are stored by deleting unneeded copies of files indicated in the rule. When the backup set is run, each rule is applied in the order listed within the set's rule list.

Asynchronously

An attribute of a Before and After Action.  If designated for a Before Action, the action finish before the backup job begins.  If designated for an After Action, the backup job finishes before the action is run.

Backup

Sending a copy of data to another location.  Online backups send backed-up data over the Internet to an off-site server.  Local backups send backed-up data to a destination on either the same computer or the same network.

Backup Set

The combination of a backup job (with its accompanying settings) and the data selected to be backed up.  Backup set types include File and Folder, SQL, System State, Exchange, VMware, Hyper-V, and Images.

Cloud

Off-site servers

Cloud Archive

Data which is backed up to a cloud storage provider's servers.

Cloud Application

A software application that is never installed on a local machine and is always accessed via the Internet.

Cloud Provider

A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations and/or individuals.

Computer ID

A unique four digit code used to keep track of multiple subaccounts within a single client account. The first computer you install the Intronis software on has the computer ID 0000.  Subsequent subaccounts have the next sequential computer ID of 0001, 0002, and so on.

Differential Backup

A type of backup associated with SQL Server, File and Folder, VMware Standard, and Hyper-V Standard backup set types.  After the initial full backup is completed, a differential backup backs up all data which has changed since the full backup.

Encryption

A digital cypher that protects your data.  Encrypting your data is the digital equivalent of locking your valuables in a safe.  Encrypted data can only be decrypted (unlocked) with the right encryption key.

Encryption Key

The encryption key is used both to encrypt and decrypt data; without it, encrypted data cannot be decrypted without the exact key used for the initial encryption.

File Catalog

Also known as just the catalog, it is record of all of data and revisions contained within a backup set.  The catalog is updated and transmitted to the backup servers with every backup.

Incremental Backup

Only backs up the data changed since the last backup.  Exchange, Imaging, VMware QuickSpin, and Hyper-V Rapid Recovery backup set types use incremental backups.

IntelliBlox

A proprietary technology that uploads only the changed blocks of a file.  At your next backup, data is scanned, any changes at the block level are detected, and only these changes are uploaded.

MSP

Managed Service Provider - provides delivery and management of a variety of services which include, but are not limited to, network-based services (online backup), applications, and equipment.

NTFS

New Technology File System - the standard file system of all supported operating systems.  Supersedes the FAT and FAT32 as the preferred file system for Microsoft's Windows-branded operating systems.

Remote Server

Location from which data is backed up and to which data is restored

Replication

The process of duplicating data in order to have multiple copies

Restore

The process of retrieving backed up data and copying it to your computer

Revision

Changes to a backed-up file, database, or image 

Revision Rules

See Archive rules.

Synchronously

An attribute of a Before and After Action. If designated for a Before Action, the action starts at the beginning of a backup job but does not necessarily finish before the backup job begins. If designated for an After Action, the backup job may not completely finish before the action is run.

UNC

Uniform Naming Convention - specifies a well-formed syntax to describe the location of a network resource, such as a shared file, directory, or printer.  The UNC syntax for Windows systems is as follows: \\ComputerName\SharedFolder\Resource.

  • Was this article helpful?