5
Copyright © Acronis International GmbH, 2002-2014
5.1.5
When to recover ......................................................................................................................................... 114
5.1.6
Task credentials ........................................................................................................................................... 114
5.2
Recovering BIOS-based systems to UEFI-based and vice versa .............................................114
5.2.1
Recovering volumes .................................................................................................................................... 115
5.2.2
Recovering disks .......................................................................................................................................... 116
5.3
Acronis Active Restore ...........................................................................................................118
5.4
Bootability troubleshooting ...................................................................................................120
5.4.1
How to reactivate GRUB and change its configuration ............................................................................ 121
5.4.2
About Windows loaders ............................................................................................................................. 122
5.5
Reverting a Windows system to its factory settings ..............................................................123
5.6
Default recovery options .......................................................................................................123
5.6.1
Additional settings....................................................................................................................................... 124
5.6.2
E-mail notifications ...................................................................................................................................... 125
5.6.3
Error handling .............................................................................................................................................. 126
5.6.4
Event tracing ................................................................................................................................................ 127
5.6.5
File-level security ......................................................................................................................................... 128
5.6.6
Mount points ............................................................................................................................................... 128
5.6.7
Pre/Post commands .................................................................................................................................... 129
5.6.8
Recovery priority ......................................................................................................................................... 130
6
Conversion to a virtual machine ................................................................................... 131
6.1
Conversion methods ..............................................................................................................131
6.2
Conversion to an automatically created virtual machine ......................................................131
6.2.1
Considerations before conversion ............................................................................................................. 132
6.2.2
Setting up regular conversion to a virtual machine .................................................................................. 133
6.2.3
Recovery to the ''New virtual machine'' destination ................................................................................ 136
6.3
Recovery to a manually created virtual machine ..................................................................139
6.3.1
Considerations before conversion ............................................................................................................. 139
6.3.2
Steps to perform ......................................................................................................................................... 140
7
Storing the backed up data........................................................................................... 141
7.1
Vaults .....................................................................................................................................141
7.1.1
Working with vaults .................................................................................................................................... 142
7.1.2
Personal vaults ............................................................................................................................................ 142
7.2
Acronis Secure Zone ..............................................................................................................145
7.2.1
Creating Acronis Secure Zone .................................................................................................................... 145
7.2.2
Managing Acronis Secure Zone .................................................................................................................. 147
7.3
Removable devices ................................................................................................................148
8
Operations with archives and backups.......................................................................... 150
8.1
Validating archives and backups ............................................................................................150
8.1.1
Archive selection ......................................................................................................................................... 151
8.1.2
Backup selection .......................................................................................................................................... 151
8.1.3
Vault selection ............................................................................................................................................. 151
8.1.4
Access credentials for source ..................................................................................................................... 152
8.1.5
When to validate ......................................................................................................................................... 152
8.1.6
Task credentials ........................................................................................................................................... 153
8.2
Exporting archives and backups ............................................................................................153
8.2.1
Archive selection ......................................................................................................................................... 155
8.2.2
Backup selection .......................................................................................................................................... 156
8.2.3
Access credentials for source ..................................................................................................................... 156
8.2.4
Destination selection .................................................................................................................................. 156