beautypg.com
5
Copyright © Acronis International GmbH, 2002-2014
5.1.5
When to recover ......................................................................................................................................... 112
5.1.6
Task credentials ........................................................................................................................................... 112
5.2
Recovering BIOS-based systems to UEFI-based and vice versa .............................................112
5.2.1
Recovering volumes .................................................................................................................................... 113
5.2.2
Recovering disks .......................................................................................................................................... 114
5.3
Acronis Active Restore ...........................................................................................................116
5.4
Bootability troubleshooting ...................................................................................................118
5.4.1
How to reactivate GRUB and change its configuration ............................................................................ 119
5.4.2
About Windows loaders ............................................................................................................................. 120
5.5
Reverting a Windows system to its factory settings ..............................................................121
5.6
Default recovery options .......................................................................................................121
5.6.1
Additional settings....................................................................................................................................... 122
5.6.2
E-mail notifications ...................................................................................................................................... 123
5.6.3
Error handling .............................................................................................................................................. 124
5.6.4
Event tracing ................................................................................................................................................ 125
5.6.5
File-level security ......................................................................................................................................... 126
5.6.6
Mount points ............................................................................................................................................... 126
5.6.7
Pre/Post commands .................................................................................................................................... 127
5.6.8
Recovery priority ......................................................................................................................................... 128
6
Conversion to a virtual machine ................................................................................... 129
6.1
Conversion methods ..............................................................................................................129
6.2
Conversion to an automatically created virtual machine ......................................................129
6.2.1
Considerations before conversion ............................................................................................................. 130
6.2.2
Setting up regular conversion to a virtual machine .................................................................................. 131
6.2.3
Recovery to the ''New virtual machine'' destination ................................................................................ 134
6.3
Recovery to a manually created virtual machine ..................................................................137
6.3.1
Considerations before conversion ............................................................................................................. 137
6.3.2
Steps to perform ......................................................................................................................................... 138
7
Storing the backed up data........................................................................................... 139
7.1
Vaults .....................................................................................................................................139
7.1.1
Working with vaults .................................................................................................................................... 140
7.1.2
Personal vaults ............................................................................................................................................ 140
7.2
Acronis Secure Zone ..............................................................................................................143
7.2.1
Creating Acronis Secure Zone .................................................................................................................... 143
7.2.2
Managing Acronis Secure Zone .................................................................................................................. 145
7.3
Removable devices ................................................................................................................146
8
Operations with archives and backups.......................................................................... 148
8.1
Validating archives and backups ............................................................................................148
8.1.1
Archive selection ......................................................................................................................................... 149
8.1.2
Backup selection .......................................................................................................................................... 149
8.1.3
Vault selection ............................................................................................................................................. 149
8.1.4
Access credentials for source ..................................................................................................................... 150
8.1.5
When to validate ......................................................................................................................................... 150
8.1.6
Task credentials ........................................................................................................................................... 151
8.2
Exporting archives and backups ............................................................................................151
8.2.1
Archive selection ......................................................................................................................................... 153
8.2.2
Backup selection .......................................................................................................................................... 154
8.2.3
Access credentials for source ..................................................................................................................... 154
8.2.4
Destination selection .................................................................................................................................. 154