Acronis Backup for PC - User Guide User Manual

Page 5

Advertising
background image

5

Copyright © Acronis International GmbH, 2002-2014

5.1.5

When to recover ......................................................................................................................................... 112

5.1.6

Task credentials ........................................................................................................................................... 112

5.2

Recovering BIOS-based systems to UEFI-based and vice versa .............................................112

5.2.1

Recovering volumes .................................................................................................................................... 113

5.2.2

Recovering disks .......................................................................................................................................... 114

5.3

Acronis Active Restore ...........................................................................................................116

5.4

Bootability troubleshooting ...................................................................................................118

5.4.1

How to reactivate GRUB and change its configuration ............................................................................ 119

5.4.2

About Windows loaders ............................................................................................................................. 120

5.5

Reverting a Windows system to its factory settings ..............................................................121

5.6

Default recovery options .......................................................................................................121

5.6.1

Additional settings....................................................................................................................................... 122

5.6.2

E-mail notifications ...................................................................................................................................... 123

5.6.3

Error handling .............................................................................................................................................. 124

5.6.4

Event tracing ................................................................................................................................................ 125

5.6.5

File-level security ......................................................................................................................................... 126

5.6.6

Mount points ............................................................................................................................................... 126

5.6.7

Pre/Post commands .................................................................................................................................... 127

5.6.8

Recovery priority ......................................................................................................................................... 128

6

Conversion to a virtual machine ................................................................................... 129

6.1

Conversion methods ..............................................................................................................129

6.2

Conversion to an automatically created virtual machine ......................................................129

6.2.1

Considerations before conversion ............................................................................................................. 130

6.2.2

Setting up regular conversion to a virtual machine .................................................................................. 131

6.2.3

Recovery to the ''New virtual machine'' destination ................................................................................ 134

6.3

Recovery to a manually created virtual machine ..................................................................137

6.3.1

Considerations before conversion ............................................................................................................. 137

6.3.2

Steps to perform ......................................................................................................................................... 138

7

Storing the backed up data........................................................................................... 139

7.1

Vaults .....................................................................................................................................139

7.1.1

Working with vaults .................................................................................................................................... 140

7.1.2

Personal vaults ............................................................................................................................................ 140

7.2

Acronis Secure Zone ..............................................................................................................143

7.2.1

Creating Acronis Secure Zone .................................................................................................................... 143

7.2.2

Managing Acronis Secure Zone .................................................................................................................. 145

7.3

Removable devices ................................................................................................................146

8

Operations with archives and backups.......................................................................... 148

8.1

Validating archives and backups ............................................................................................148

8.1.1

Archive selection ......................................................................................................................................... 149

8.1.2

Backup selection .......................................................................................................................................... 149

8.1.3

Vault selection ............................................................................................................................................. 149

8.1.4

Access credentials for source ..................................................................................................................... 150

8.1.5

When to validate ......................................................................................................................................... 150

8.1.6

Task credentials ........................................................................................................................................... 151

8.2

Exporting archives and backups ............................................................................................151

8.2.1

Archive selection ......................................................................................................................................... 153

8.2.2

Backup selection .......................................................................................................................................... 154

8.2.3

Access credentials for source ..................................................................................................................... 154

8.2.4

Destination selection .................................................................................................................................. 154

Advertising