6
Direct management ............................................................................................................. 177
6.1
Administering a managed machine ...................................................................................... 177
6.1.1
Dashboard ............................................................................................................................................... 177
6.1.2
Backup plans and tasks ........................................................................................................................... 179
6.1.3
Log ............................................................................................................................................................ 190
6.2
Creating a backup plan ......................................................................................................... 192
6.2.1
Why is the program asking for the password? ....................................................................................... 194
6.2.2
Backup plan's credentials ........................................................................................................................ 194
6.2.3
Source type .............................................................................................................................................. 195
6.2.4
Items to back up ...................................................................................................................................... 195
6.2.5
Access credentials for source .................................................................................................................. 197
6.2.6
Exclusions ................................................................................................................................................. 197
6.2.7
Archive ..................................................................................................................................................... 198
6.2.8
Access credentials for archive location ................................................................................................... 199
6.2.9
Backup schemes ...................................................................................................................................... 200
6.2.10
Archive validation .................................................................................................................................... 209
6.2.11
Setting up regular conversion to a virtual machine ............................................................................... 209
6.3
Recovering data .................................................................................................................... 211
6.3.1
Task credentials ....................................................................................................................................... 213
6.3.2
Archive selection ..................................................................................................................................... 213
6.3.3
Data type.................................................................................................................................................. 214
6.3.4
Content selection .................................................................................................................................... 214
6.3.5
Access credentials for location ................................................................................................................ 215
6.3.6
Destination selection ............................................................................................................................... 216
6.3.7
Access credentials for destination .......................................................................................................... 222
6.3.8
When to recover ...................................................................................................................................... 222
6.3.9
Universal Restore .................................................................................................................................... 223
6.3.10
How to convert a disk backup to a virtual machine ............................................................................... 224
6.3.11
Bootability troubleshooting .................................................................................................................... 225
6.3.12
Recovering MD devices (Linux) ............................................................................................................... 228
6.3.13
Recovering a vast number of files from a file backup ............................................................................ 229
6.3.14
Recovering the storage node .................................................................................................................. 230
6.4
Validating vaults, archives and backups ............................................................................... 230
6.4.1
Task credentials ....................................................................................................................................... 231
6.4.2
Archive selection ..................................................................................................................................... 232
6.4.3
Backup selection ...................................................................................................................................... 233
6.4.4
Location selection .................................................................................................................................... 233
6.4.5
Access credentials for source .................................................................................................................. 233
6.4.6
When to validate ..................................................................................................................................... 234
6.5
Mounting an image ............................................................................................................... 234
6.5.1
Archive selection ..................................................................................................................................... 235
6.5.2
Backup selection ...................................................................................................................................... 236
6.5.3
Access credentials ................................................................................................................................... 236
6.5.4
Volume selection ..................................................................................................................................... 236
6.6
Managing mounted images .................................................................................................. 237
6.7
Exporting archives and backups ........................................................................................... 237
6.7.1
Task credentials ....................................................................................................................................... 239
6.7.2
Archive selection ..................................................................................................................................... 240
6.7.3
Backup selection ...................................................................................................................................... 241
6.7.4
Access credentials for source .................................................................................................................. 241
6.7.5
Location selection .................................................................................................................................... 241
6.7.6
Access credentials for destination .......................................................................................................... 243
6.8
Acronis Secure Zone ............................................................................................................. 243