Acronis Backup for Linux Server - User Guide User Manual

Page 5

Advertising
background image

5

Copyright © Acronis International GmbH, 2002-2014

5.2.1

How to reactivate GRUB and change its configuration ............................................................................ 108

5.3

Default recovery options .......................................................................................................109

5.3.1

Additional settings....................................................................................................................................... 111

5.3.2

E-mail notifications ...................................................................................................................................... 112

5.3.3

Error handling .............................................................................................................................................. 113

5.3.4

Event tracing ................................................................................................................................................ 113

5.3.5

File-level security ......................................................................................................................................... 114

5.3.6

Pre/Post commands .................................................................................................................................... 114

5.3.7

Recovery priority ......................................................................................................................................... 116

6

Conversion to a virtual machine ................................................................................... 117

6.1

Conversion methods ..............................................................................................................117

6.2

Conversion to an automatically created virtual machine ......................................................117

6.2.1

Considerations before conversion ............................................................................................................. 118

6.2.2

Setting up regular conversion to a virtual machine .................................................................................. 119

6.2.3

Recovery to the ''New virtual machine'' destination ................................................................................ 122

6.3

Recovery to a manually created virtual machine ..................................................................125

6.3.1

Considerations before conversion ............................................................................................................. 125

6.3.2

Steps to perform ......................................................................................................................................... 126

7

Storing the backed up data........................................................................................... 127

7.1

Vaults .....................................................................................................................................127

7.1.1

Working with vaults .................................................................................................................................... 128

7.1.2

Personal vaults ............................................................................................................................................ 128

7.2

Acronis Secure Zone ..............................................................................................................131

7.2.1

Creating Acronis Secure Zone .................................................................................................................... 131

7.2.2

Managing Acronis Secure Zone .................................................................................................................. 133

7.3

Removable devices ................................................................................................................134

8

Operations with archives and backups.......................................................................... 136

8.1

Validating archives and backups ............................................................................................136

8.1.1

Archive selection ......................................................................................................................................... 137

8.1.2

Backup selection .......................................................................................................................................... 137

8.1.3

Vault selection ............................................................................................................................................. 137

8.1.4

Access credentials for source ..................................................................................................................... 138

8.1.5

When to validate ......................................................................................................................................... 138

8.1.6

Task credentials ........................................................................................................................................... 139

8.2

Exporting archives and backups ............................................................................................139

8.2.1

Archive selection ......................................................................................................................................... 141

8.2.2

Backup selection .......................................................................................................................................... 142

8.2.3

Access credentials for source ..................................................................................................................... 142

8.2.4

Destination selection .................................................................................................................................. 142

8.2.5

Access credentials for destination ............................................................................................................. 143

8.3

Mounting an image ................................................................................................................144

8.3.1

Archive selection ......................................................................................................................................... 145

8.3.2

Backup selection .......................................................................................................................................... 145

8.3.3

Access credentials ....................................................................................................................................... 145

8.3.4

Volume selection ......................................................................................................................................... 146

8.3.5

Managing mounted images........................................................................................................................ 146

8.4

Operations available in vaults ................................................................................................147

8.4.1

Operations with archives ............................................................................................................................ 147

8.4.2

Operations with backups ............................................................................................................................ 148

Advertising