6.2
Creating a backup plan ......................................................................................................... 181
6.2.1
Why is the program asking for the password? ....................................................................................... 183
6.2.2
Backup plan's credentials ........................................................................................................................ 183
6.2.3
Source type .............................................................................................................................................. 184
6.2.4
Items to back up ...................................................................................................................................... 184
6.2.5
Access credentials for source .................................................................................................................. 186
6.2.6
Exclusions ................................................................................................................................................. 186
6.2.7
Archive ..................................................................................................................................................... 187
6.2.8
Access credentials for archive location ................................................................................................... 188
6.2.9
Backup schemes ...................................................................................................................................... 189
6.2.10
Archive validation .................................................................................................................................... 198
6.2.11
Setting up regular conversion to a virtual machine ............................................................................... 198
6.3
Recovering data .................................................................................................................... 200
6.3.1
Task credentials ....................................................................................................................................... 202
6.3.2
Archive selection ..................................................................................................................................... 202
6.3.3
Data type.................................................................................................................................................. 203
6.3.4
Content selection .................................................................................................................................... 203
6.3.5
Access credentials for location ................................................................................................................ 204
6.3.6
Destination selection ............................................................................................................................... 205
6.3.7
Access credentials for destination .......................................................................................................... 211
6.3.8
When to recover ...................................................................................................................................... 211
6.3.9
Universal Restore .................................................................................................................................... 212
6.3.10
How to convert a disk backup to a virtual machine ............................................................................... 213
6.3.11
Bootability troubleshooting .................................................................................................................... 214
6.3.12
Recovering a vast number of files from a file backup ............................................................................ 217
6.3.13
Recovering the storage node .................................................................................................................. 218
6.4
Validating vaults, archives and backups ............................................................................... 219
6.4.1
Task credentials ....................................................................................................................................... 220
6.4.2
Archive selection ..................................................................................................................................... 220
6.4.3
Backup selection ...................................................................................................................................... 221
6.4.4
Location selection .................................................................................................................................... 221
6.4.5
Access credentials for source .................................................................................................................. 222
6.4.6
When to validate ..................................................................................................................................... 222
6.5
Mounting an image ............................................................................................................... 222
6.5.1
Archive selection ..................................................................................................................................... 223
6.5.2
Backup selection ...................................................................................................................................... 224
6.5.3
Access credentials ................................................................................................................................... 224
6.5.4
Volume selection ..................................................................................................................................... 225
6.6
Managing mounted images .................................................................................................. 225
6.7
Exporting archives and backups ........................................................................................... 225
6.7.1
Task credentials ....................................................................................................................................... 228
6.7.2
Archive selection ..................................................................................................................................... 228
6.7.3
Backup selection ...................................................................................................................................... 229
6.7.4
Access credentials for source .................................................................................................................. 229
6.7.5
Location selection .................................................................................................................................... 230
6.7.6
Access credentials for destination .......................................................................................................... 231
6.8
Acronis Secure Zone ............................................................................................................. 232
6.8.1
Creating Acronis Secure Zone ................................................................................................................. 232
6.8.2
Managing Acronis Secure Zone ............................................................................................................... 234
6.9
Acronis Startup Recovery Manager ...................................................................................... 235
6.10 Bootable media ..................................................................................................................... 236
6.10.1
How to create bootable media ............................................................................................................... 237
6.10.2
Connecting to a machine booted from media ....................................................................................... 244