Acronis Backup for Windows Server Essentials - User Guide User Manual

Page 5

Advertising
background image

5

Copyright © Acronis International GmbH, 2002-2014

4.7.21 Sector-by-sector backup ............................................................................................................................. 124
4.7.22 Tape management ...................................................................................................................................... 124
4.7.23 Task failure handling ................................................................................................................................... 126
4.7.24 Task start conditions ................................................................................................................................... 127
4.7.25 Volume Shadow Copy Service .................................................................................................................... 128

5

Recovery ..................................................................................................................... 131

5.1

Creating a recovery task ........................................................................................................131

5.1.1

What to recover .......................................................................................................................................... 133

5.1.2

Access credentials for location ................................................................................................................... 137

5.1.3

Access credentials for destination ............................................................................................................. 138

5.1.4

Where to recover ........................................................................................................................................ 138

5.1.5

When to recover ......................................................................................................................................... 146

5.1.6

Task credentials ........................................................................................................................................... 146

5.2

Recovering BIOS-based systems to UEFI-based and vice versa .............................................147

5.2.1

Recovering volumes .................................................................................................................................... 148

5.2.2

Recovering disks .......................................................................................................................................... 149

5.3

Acronis Active Restore ...........................................................................................................151

5.4

Bootability troubleshooting ...................................................................................................152

5.4.1

How to reactivate GRUB and change its configuration ............................................................................ 154

5.4.2

About Windows loaders ............................................................................................................................. 155

5.5

Reverting a Windows system to its factory settings ..............................................................155

5.6

Default recovery options .......................................................................................................156

5.6.1

Additional settings....................................................................................................................................... 157

5.6.2

E-mail notifications ...................................................................................................................................... 158

5.6.3

Error handling .............................................................................................................................................. 160

5.6.4

Event tracing ................................................................................................................................................ 160

5.6.5

File-level security ......................................................................................................................................... 161

5.6.6

Mount points ............................................................................................................................................... 162

5.6.7

Pre/Post commands .................................................................................................................................... 162

5.6.8

Recovery priority ......................................................................................................................................... 163

5.6.9

Tape management ...................................................................................................................................... 164

6

Conversion to a virtual machine ................................................................................... 165

6.1

Conversion methods ..............................................................................................................165

6.2

Conversion to an automatically created virtual machine ......................................................165

6.2.1

Considerations before conversion ............................................................................................................. 166

6.2.2

Setting up regular conversion to a virtual machine .................................................................................. 167

6.2.3

Recovery to the ''New virtual machine'' destination ................................................................................ 170

6.3

Recovery to a manually created virtual machine ..................................................................173

6.3.1

Considerations before conversion ............................................................................................................. 173

6.3.2

Steps to perform ......................................................................................................................................... 174

7

Storing the backed up data........................................................................................... 175

7.1

Vaults .....................................................................................................................................175

7.1.1

Working with vaults .................................................................................................................................... 176

7.1.2

Centralized vaults ........................................................................................................................................ 177

7.1.3

Personal vaults ............................................................................................................................................ 186

7.1.4

Changing the default cache folder for catalog files .................................................................................. 188

7.2

Acronis Secure Zone ..............................................................................................................189

7.2.1

Creating Acronis Secure Zone .................................................................................................................... 190

7.2.2

Managing Acronis Secure Zone .................................................................................................................. 192

Advertising
This manual is related to the following products: