User Guide

6 Direct management ............................................................................................................. 177
6.1 Administering a managed machine ...................................................................................... 177
6.1.1 Dashboard ............................................................................................................................................... 177
6.1.2 Backup plans and tasks ........................................................................................................................... 179
6.1.3 Log ............................................................................................................................................................ 190
6.2 Creating a backup plan ......................................................................................................... 192
6.2.1 Why is the program asking for the password? ....................................................................................... 194
6.2.2 Backup plan's credentials ........................................................................................................................ 194
6.2.3 Source type .............................................................................................................................................. 195
6.2.4 Items to back up ...................................................................................................................................... 195
6.2.5 Access credentials for source .................................................................................................................. 197
6.2.6 Exclusions ................................................................................................................................................. 197
6.2.7 Archive ..................................................................................................................................................... 198
6.2.8 Access credentials for archive location ................................................................................................... 199
6.2.9 Backup schemes ...................................................................................................................................... 200
6.2.10 Archive validation .................................................................................................................................... 209
6.2.11 Setting up regular conversion to a virtual machine ............................................................................... 209
6.3 Recovering data .................................................................................................................... 211
6.3.1 Task credentials ....................................................................................................................................... 213
6.3.2 Archive selection ..................................................................................................................................... 213
6.3.3 Data type.................................................................................................................................................. 214
6.3.4 Content selection .................................................................................................................................... 214
6.3.5 Access credentials for location ................................................................................................................ 215
6.3.6 Destination selection ............................................................................................................................... 216
6.3.7 Access credentials for destination .......................................................................................................... 222
6.3.8 When to recover ...................................................................................................................................... 222
6.3.9 Universal Restore .................................................................................................................................... 223
6.3.10 How to convert a disk backup to a virtual machine ............................................................................... 224
6.3.11 Bootability troubleshooting .................................................................................................................... 225
6.3.12 Recovering MD devices (Linux) ............................................................................................................... 228
6.3.13 Recovering a vast number of files from a file backup ............................................................................ 229
6.3.14 Recovering the storage node .................................................................................................................. 230
6.4 Validating vaults, archives and backups ............................................................................... 230
6.4.1 Task credentials ....................................................................................................................................... 231
6.4.2 Archive selection ..................................................................................................................................... 232
6.4.3 Backup selection ...................................................................................................................................... 233
6.4.4 Location selection .................................................................................................................................... 233
6.4.5 Access credentials for source .................................................................................................................. 233
6.4.6 When to validate ..................................................................................................................................... 234
6.5 Mounting an image ............................................................................................................... 234
6.5.1 Archive selection ..................................................................................................................................... 235
6.5.2 Backup selection ...................................................................................................................................... 236
6.5.3 Access credentials ................................................................................................................................... 236
6.5.4 Volume selection ..................................................................................................................................... 236
6.6 Managing mounted images .................................................................................................. 237
6.7 Exporting archives and backups ........................................................................................... 237
6.7.1 Task credentials ....................................................................................................................................... 239
6.7.2 Archive selection ..................................................................................................................................... 240
6.7.3 Backup selection ...................................................................................................................................... 241
6.7.4 Access credentials for source .................................................................................................................. 241
6.7.5 Location selection .................................................................................................................................... 241
6.7.6 Access credentials for destination .......................................................................................................... 243
6.8 Acronis Secure Zone ............................................................................................................. 243