When you validate a backup what is Acronis actually doing?
How does Acronis True Image Home validate a backup (I have 2011 but I doubt that matters much). It takes a while and seems to only use the .tib file rather than comparing to the source again, but maybe I'm wrong. Does it calculate some sort of CRC or SHA-1 for the .tib file and compare that to the source and/or does it someone check that the backup could be mounted and successfully copied from?
I believe that it "somehow checks that the backup can be mounted and successfully copied from". Someone will correct me if I'm wrong, but I don't think Verify is any different whether you've just made a .tib from a Source drive, or if you're running a Verify on a .tib without the source being present at all.
From what I've read here too, it doesn't seem that anyone but Acronis knows the inner secrets of the .tib file, otherwise other checkers (and repair tools?) might have cropped-up from programmers who use Acronis.
It does not compare data in the backup to the source. In fact, a .tib image may be validated even without the source being available. Validation performs some sort of internal checking.
If validating a differential or incremental image, all previous images in the chain (on which this backup depends) must also be checked as part of the validation, so they must be accessible.
i am taking incremental backup through acronis 11.5 and its working fine. but when i apply the retention policy (delete old data 5 day), its converting the date of all old files to the current day backup date. rather than it should delete the all old files, its contineously creating the incremental files on daily basis. i want to delete 5 days old incremental backup and want to start from intial level automiatically.
please guide about the retention Policy..!
Welcome to Acronis user forums! This forum section is dedicated to Acronis True Image product line. I'd recommend you starting a new discussion in Acronis Backup 11.7 forum section. Please attach screenshots of retention settings and actual backup files in the target location, so that we can see the whole backup chain with corresponding dates.