5 Copyright © Acronis International GmbH, 2002-2014
5.2.1 How to reactivate GRUB and change its configuration ............................................................................ 108
5.3 Default recovery options .......................................................................................................109
5.3.1 Additional settings....................................................................................................................................... 111
5.3.2 E-mail notifications ...................................................................................................................................... 112
5.3.3 Error handling .............................................................................................................................................. 113
5.3.4 Event tracing ................................................................................................................................................ 113
5.3.5 File-level security ......................................................................................................................................... 114
5.3.6 Pre/Post commands .................................................................................................................................... 114
5.3.7 Recovery priority ......................................................................................................................................... 116
6 Conversion to a virtual machine ................................................................................... 117
6.1 Conversion methods ..............................................................................................................117
6.2 Conversion to an automatically created virtual machine ......................................................117
6.2.1 Considerations before conversion ............................................................................................................. 118
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 119
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 122
6.3 Recovery to a manually created virtual machine ..................................................................125
6.3.1 Considerations before conversion ............................................................................................................. 125
6.3.2 Steps to perform ......................................................................................................................................... 126
7 Storing the backed up data........................................................................................... 127
7.1 Vaults .....................................................................................................................................127
7.1.1 Working with vaults .................................................................................................................................... 128
7.1.2 Personal vaults ............................................................................................................................................ 128
7.2 Acronis Secure Zone ..............................................................................................................131
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 131
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 133
7.3 Removable devices ................................................................................................................134
8 Operations with archives and backups.......................................................................... 136
8.1 Validating archives and backups ............................................................................................136
8.1.1 Archive selection ......................................................................................................................................... 137
8.1.2 Backup selection .......................................................................................................................................... 137
8.1.3 Vault selection ............................................................................................................................................. 137
8.1.4 Access credentials for source ..................................................................................................................... 138
8.1.5 When to validate ......................................................................................................................................... 138
8.1.6 Task credentials ........................................................................................................................................... 139
8.2 Exporting archives and backups ............................................................................................139
8.2.1 Archive selection ......................................................................................................................................... 141
8.2.2 Backup selection .......................................................................................................................................... 142
8.2.3 Access credentials for source ..................................................................................................................... 142
8.2.4 Destination selection .................................................................................................................................. 142
8.2.5 Access credentials for destination ............................................................................................................. 143
8.3 Mounting an image ................................................................................................................144
8.3.1 Archive selection ......................................................................................................................................... 145
8.3.2 Backup selection .......................................................................................................................................... 145
8.3.3 Access credentials ....................................................................................................................................... 145
8.3.4 Volume selection ......................................................................................................................................... 146
8.3.5 Managing mounted images........................................................................................................................ 146
8.4 Operations available in vaults ................................................................................................147
8.4.1 Operations with archives ............................................................................................................................ 147
8.4.2 Operations with backups ............................................................................................................................ 148
Kommentare zu diesen Handbüchern