beautypg.com
5
Copyright © Acronis International GmbH, 2002-2014
5.2.1
How to reactivate GRUB and change its configuration ............................................................................ 108
5.3
Default recovery options .......................................................................................................109
5.3.1
Additional settings....................................................................................................................................... 111
5.3.2
E-mail notifications ...................................................................................................................................... 112
5.3.3
Error handling .............................................................................................................................................. 113
5.3.4
Event tracing ................................................................................................................................................ 113
5.3.5
File-level security ......................................................................................................................................... 114
5.3.6
Pre/Post commands .................................................................................................................................... 114
5.3.7
Recovery priority ......................................................................................................................................... 116
6
Conversion to a virtual machine ................................................................................... 117
6.1
Conversion methods ..............................................................................................................117
6.2
Conversion to an automatically created virtual machine ......................................................117
6.2.1
Considerations before conversion ............................................................................................................. 118
6.2.2
Setting up regular conversion to a virtual machine .................................................................................. 119
6.2.3
Recovery to the ''New virtual machine'' destination ................................................................................ 122
6.3
Recovery to a manually created virtual machine ..................................................................125
6.3.1
Considerations before conversion ............................................................................................................. 125
6.3.2
Steps to perform ......................................................................................................................................... 126
7
Storing the backed up data........................................................................................... 127
7.1
Vaults .....................................................................................................................................127
7.1.1
Working with vaults .................................................................................................................................... 128
7.1.2
Personal vaults ............................................................................................................................................ 128
7.2
Acronis Secure Zone ..............................................................................................................131
7.2.1
Creating Acronis Secure Zone .................................................................................................................... 131
7.2.2
Managing Acronis Secure Zone .................................................................................................................. 133
7.3
Removable devices ................................................................................................................134
8
Operations with archives and backups.......................................................................... 136
8.1
Validating archives and backups ............................................................................................136
8.1.1
Archive selection ......................................................................................................................................... 137
8.1.2
Backup selection .......................................................................................................................................... 137
8.1.3
Vault selection ............................................................................................................................................. 137
8.1.4
Access credentials for source ..................................................................................................................... 138
8.1.5
When to validate ......................................................................................................................................... 138
8.1.6
Task credentials ........................................................................................................................................... 139
8.2
Exporting archives and backups ............................................................................................139
8.2.1
Archive selection ......................................................................................................................................... 141
8.2.2
Backup selection .......................................................................................................................................... 142
8.2.3
Access credentials for source ..................................................................................................................... 142
8.2.4
Destination selection .................................................................................................................................. 142
8.2.5
Access credentials for destination ............................................................................................................. 143
8.3
Mounting an image ................................................................................................................144
8.3.1
Archive selection ......................................................................................................................................... 145
8.3.2
Backup selection .......................................................................................................................................... 145
8.3.3
Access credentials ....................................................................................................................................... 145
8.3.4
Volume selection ......................................................................................................................................... 146
8.3.5
Managing mounted images........................................................................................................................ 146
8.4
Operations available in vaults ................................................................................................147
8.4.1
Operations with archives ............................................................................................................................ 147
8.4.2
Operations with backups ............................................................................................................................ 148