User manual

Table Of Contents
5 Copyright © Acronis International GmbH, 2002-2016
5.4.1 How to reactivate GRUB and change its configuration ............................................................................ 120
5.4.2 About Windows loaders ............................................................................................................................. 121
5.5 Reverting a Windows system to its factory settings ..............................................................122
5.6 Default recovery options .......................................................................................................122
5.6.1 Additional settings....................................................................................................................................... 123
5.6.2 E-mail notifications ...................................................................................................................................... 124
5.6.3 Error handling .............................................................................................................................................. 125
5.6.4 Event tracing ................................................................................................................................................ 126
5.6.5 File-level security ......................................................................................................................................... 127
5.6.6 Mount points ............................................................................................................................................... 127
5.6.7 Pre/Post commands .................................................................................................................................... 128
5.6.8 Recovery priority ......................................................................................................................................... 129
6 Conversion to a virtual machine ................................................................................... 131
6.1 Conversion methods ..............................................................................................................131
6.2 Conversion to an automatically created virtual machine ......................................................131
6.2.1 Considerations before conversion ............................................................................................................. 132
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 133
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 136
6.3 Recovery to a manually created virtual machine ..................................................................139
6.3.1 Considerations before conversion ............................................................................................................. 139
6.3.2 Steps to perform ......................................................................................................................................... 140
7 Storing the backed up data........................................................................................... 141
7.1 Vaults .....................................................................................................................................141
7.1.1 Working with vaults .................................................................................................................................... 142
7.1.2 Personal vaults ............................................................................................................................................ 142
7.2 Acronis Secure Zone ..............................................................................................................145
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 145
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 147
7.3 Removable devices ................................................................................................................148
8 Operations with archives and backups.......................................................................... 150
8.1 Validating archives and backups ............................................................................................150
8.1.1 Archive selection ......................................................................................................................................... 151
8.1.2 Backup selection .......................................................................................................................................... 151
8.1.3 Vault selection ............................................................................................................................................. 151
8.1.4 Access credentials for source ..................................................................................................................... 152
8.1.5 When to validate ......................................................................................................................................... 152
8.1.6 Task credentials ........................................................................................................................................... 153
8.2 Exporting archives and backups ............................................................................................153
8.2.1 Archive selection ......................................................................................................................................... 155
8.2.2 Backup selection .......................................................................................................................................... 156
8.2.3 Access credentials for source ..................................................................................................................... 156
8.2.4 Destination selection .................................................................................................................................. 156
8.2.5 Access credentials for destination ............................................................................................................. 157
8.3 Mounting an image ................................................................................................................158
8.3.1 Archive selection ......................................................................................................................................... 159
8.3.2 Backup selection .......................................................................................................................................... 159
8.3.3 Access credentials ....................................................................................................................................... 159
8.3.4 Volume selection ......................................................................................................................................... 160
8.3.5 Managing mounted images........................................................................................................................ 160