Acronis Backup for Windows Server - User Guide User Manual

Page 5

Advertising
background image

5

Copyright © Acronis International GmbH, 2002-2014

5.1.5

When to recover ......................................................................................................................................... 114

5.1.6

Task credentials ........................................................................................................................................... 114

5.2

Recovering BIOS-based systems to UEFI-based and vice versa .............................................114

5.2.1

Recovering volumes .................................................................................................................................... 115

5.2.2

Recovering disks .......................................................................................................................................... 116

5.3

Acronis Active Restore ...........................................................................................................118

5.4

Bootability troubleshooting ...................................................................................................120

5.4.1

How to reactivate GRUB and change its configuration ............................................................................ 121

5.4.2

About Windows loaders ............................................................................................................................. 122

5.5

Reverting a Windows system to its factory settings ..............................................................123

5.6

Default recovery options .......................................................................................................123

5.6.1

Additional settings....................................................................................................................................... 124

5.6.2

E-mail notifications ...................................................................................................................................... 125

5.6.3

Error handling .............................................................................................................................................. 126

5.6.4

Event tracing ................................................................................................................................................ 127

5.6.5

File-level security ......................................................................................................................................... 128

5.6.6

Mount points ............................................................................................................................................... 128

5.6.7

Pre/Post commands .................................................................................................................................... 129

5.6.8

Recovery priority ......................................................................................................................................... 130

6

Conversion to a virtual machine ................................................................................... 131

6.1

Conversion methods ..............................................................................................................131

6.2

Conversion to an automatically created virtual machine ......................................................131

6.2.1

Considerations before conversion ............................................................................................................. 132

6.2.2

Setting up regular conversion to a virtual machine .................................................................................. 133

6.2.3

Recovery to the ''New virtual machine'' destination ................................................................................ 136

6.3

Recovery to a manually created virtual machine ..................................................................139

6.3.1

Considerations before conversion ............................................................................................................. 139

6.3.2

Steps to perform ......................................................................................................................................... 140

7

Storing the backed up data........................................................................................... 141

7.1

Vaults .....................................................................................................................................141

7.1.1

Working with vaults .................................................................................................................................... 142

7.1.2

Personal vaults ............................................................................................................................................ 142

7.2

Acronis Secure Zone ..............................................................................................................145

7.2.1

Creating Acronis Secure Zone .................................................................................................................... 145

7.2.2

Managing Acronis Secure Zone .................................................................................................................. 147

7.3

Removable devices ................................................................................................................148

8

Operations with archives and backups.......................................................................... 150

8.1

Validating archives and backups ............................................................................................150

8.1.1

Archive selection ......................................................................................................................................... 151

8.1.2

Backup selection .......................................................................................................................................... 151

8.1.3

Vault selection ............................................................................................................................................. 151

8.1.4

Access credentials for source ..................................................................................................................... 152

8.1.5

When to validate ......................................................................................................................................... 152

8.1.6

Task credentials ........................................................................................................................................... 153

8.2

Exporting archives and backups ............................................................................................153

8.2.1

Archive selection ......................................................................................................................................... 155

8.2.2

Backup selection .......................................................................................................................................... 156

8.2.3

Access credentials for source ..................................................................................................................... 156

8.2.4

Destination selection .................................................................................................................................. 156

Advertising