6
Direct management ............................................................................................................. 173
6.1
Administering a managed machine ...................................................................................... 173
6.1.1
Dashboard ............................................................................................................................................... 173
6.1.2
Backup plans and tasks ........................................................................................................................... 175
6.1.3
Log ............................................................................................................................................................ 186
6.2
Creating a backup plan ......................................................................................................... 188
6.2.1
Why is the program asking for the password? ....................................................................................... 191
6.2.2
Backup plan's credentials ........................................................................................................................ 191
6.2.3
Source type .............................................................................................................................................. 191
6.2.4
Items to back up ...................................................................................................................................... 192
6.2.5
Access credentials for source .................................................................................................................. 193
6.2.6
Exclusions ................................................................................................................................................. 194
6.2.7
Archive ..................................................................................................................................................... 195
6.2.8
Simplified naming of backup files ........................................................................................................... 196
6.2.9
Access credentials for archive location ................................................................................................... 200
6.2.10
Backup schemes ...................................................................................................................................... 201
6.2.11
Archive validation .................................................................................................................................... 211
6.2.12
Setting up regular conversion to a virtual machine ............................................................................... 211
6.3
Recovering data .................................................................................................................... 212
6.3.1
Task credentials ....................................................................................................................................... 215
6.3.2
Archive selection ..................................................................................................................................... 215
6.3.3
Data type.................................................................................................................................................. 216
6.3.4
Content selection .................................................................................................................................... 216
6.3.5
Access credentials for location ................................................................................................................ 217
6.3.6
Destination selection ............................................................................................................................... 218
6.3.7
Access credentials for destination .......................................................................................................... 225
6.3.8
When to recover ...................................................................................................................................... 225
6.3.9
Universal Restore .................................................................................................................................... 225
6.3.10
How to convert a disk backup to a virtual machine ............................................................................... 227
6.3.11
Bootability troubleshooting .................................................................................................................... 228
6.3.12
Recovering a vast number of files from a file backup ............................................................................ 231
6.3.13
Recovering the storage node .................................................................................................................. 232
6.4
Validating vaults, archives and backups ............................................................................... 233
6.4.1
Task credentials ....................................................................................................................................... 234
6.4.2
Archive selection ..................................................................................................................................... 234
6.4.3
Backup selection ...................................................................................................................................... 235
6.4.4
Location selection .................................................................................................................................... 235
6.4.5
Access credentials for source .................................................................................................................. 236
6.4.6
When to validate ..................................................................................................................................... 236
6.5
Mounting an image ............................................................................................................... 237
6.5.1
Archive selection ..................................................................................................................................... 238
6.5.2
Backup selection ...................................................................................................................................... 239
6.5.3
Access credentials ................................................................................................................................... 239
6.5.4
Volume selection ..................................................................................................................................... 239
6.6
Managing mounted images .................................................................................................. 240
6.7
Exporting archives and backups ........................................................................................... 240
6.7.1
Task credentials ....................................................................................................................................... 243
6.7.2
Archive selection ..................................................................................................................................... 243
6.7.3
Backup selection ...................................................................................................................................... 244
6.7.4
Access credentials for source .................................................................................................................. 244
6.7.5
Location selection .................................................................................................................................... 245
6.7.6
Access credentials for destination .......................................................................................................... 246
6.8
Acronis Secure Zone ............................................................................................................. 247