beautypg.com
7.3 Restoring disks/partitions or files from images ...................................................................86
7.3.1 Starting the Restore Data Wizard................................................................................87
7.3.2 Archive selection.......................................................................................................87
7.3.3 Restoration type selection..........................................................................................88
7.3.4 Selecting a disk/partition to restore ............................................................................89
7.3.5 Selecting a target disk/partition..................................................................................89
7.3.6 Changing the restored partition type...........................................................................90
7.3.7 Changing the restored partition file system..................................................................91
7.3.8 Changing the restored partition size and location .........................................................91
7.3.9 Assigning a letter to the restored partition...................................................................92
7.3.10 Restoring several disks or partitions at once ..............................................................92
7.3.11 Using Acronis Universal Restore................................................................................92
7.3.12 Setting restore options.............................................................................................93
7.3.13 Restoration summary and executing restoration.........................................................93
7.4 Setting restore options.....................................................................................................93
7.4.1 Files to exclude from restoration.................................................................................94
7.4.2 Files overwriting mode...............................................................................................94
7.4.3 Pre/post commands ..................................................................................................94
7.4.4 Restoration priority....................................................................................................95
7.4.5 File-level security settings ..........................................................................................95
7.4.6 Specifying mass storage drivers..................................................................................95
7.4.7 Additional settings.....................................................................................................96
7.4.8 Error handling...........................................................................................................96
7.5 Creating dynamic disks and volumes .................................................................................97
7.5.1 Creating dynamic volumes .........................................................................................97
Chapter 8. Scheduling tasks................................................................................100
8.1 Creating scheduled tasks................................................................................................ 100
8.1.1 Setting up daily execution........................................................................................ 102
8.1.2 Setting up weekly execution..................................................................................... 103
8.1.3 Setting up monthly execution................................................................................... 104
8.1.4 Setting up one-time execution.................................................................................. 104
8.1.5 Setting up event-driven execution ............................................................................ 105
8.2 Managing scheduled tasks.............................................................................................. 105
Chapter 9. Managing the Acronis Secure Zone ...................................................106
9.1 Creating Acronis Secure Zone ......................................................................................... 106
9.2 Resizing the Acronis Secure Zone.................................................................................... 108
9.3 Changing the password for Acronis Secure Zone .............................................................. 109
9.4 Deleting Acronis Secure Zone ......................................................................................... 109
Chapter 10. Creating bootable media .................................................................110
10.1 Creating Acronis rescue media ...................................................................................... 110
10.2 Creating a Win PE ISO with Acronis True Image for Microsoft Small Business Server ......... 112
Chapter 11. Operations with archives.................................................................114
11.1 Validating backup archives ........................................................................................... 114
11.2 Exploring archives and mounting images ....................................................................... 114
11.2.1 Exploring an archive .............................................................................................. 115
11.2.2 Mounting an image................................................................................................ 116
11.2.3 Unmounting an image ........................................................................................... 118
11.3 Consolidating backups.................................................................................................. 118
Chapter 12. Notifications and event tracing .......................................................122
12.1 Email notification ......................................................................................................... 122
12.2 WinPopup notification .................................................................................................. 123
12.3 Viewing logs................................................................................................................ 123
12.4 Event tracing............................................................................................................... 124
8 Copyright © Acronis, Inc., 2000-2008