User Guide

6.4.2 Archive selection ..................................................................................................................................... 139
6.4.3 Backup selection ...................................................................................................................................... 140
6.4.4 Location selection .................................................................................................................................... 140
6.4.5 Access credentials for source .................................................................................................................. 140
6.4.6 When to validate ..................................................................................................................................... 141
6.5 Mounting an image ............................................................................................................... 141
6.5.1 Archive selection ..................................................................................................................................... 142
6.5.2 Backup selection ...................................................................................................................................... 143
6.5.3 Access credentials ................................................................................................................................... 143
6.5.4 Volume selection ..................................................................................................................................... 144
6.6 Managing mounted images .................................................................................................. 144
6.7 Exporting archives and backups ........................................................................................... 145
6.7.1 Task credentials ....................................................................................................................................... 147
6.7.2 Archive selection ..................................................................................................................................... 148
6.7.3 Backup selection ...................................................................................................................................... 149
6.7.4 Access credentials for source .................................................................................................................. 149
6.7.5 Location selection .................................................................................................................................... 149
6.7.6 Access credentials for destination .......................................................................................................... 150
6.8 Acronis Secure Zone ............................................................................................................. 151
6.8.1 Creating Acronis Secure Zone ................................................................................................................. 151
6.8.2 Managing Acronis Secure Zone ............................................................................................................... 153
6.9 Acronis Startup Recovery Manager ...................................................................................... 154
6.10 Bootable media ..................................................................................................................... 155
6.10.1 Linux-based bootable media ................................................................................................................... 156
6.10.2 Connecting to a machine booted from media ....................................................................................... 159
6.10.3 Working under bootable media .............................................................................................................. 160
6.10.4 List of commands and utilities available in Linux-based bootable media ............................................. 161
6.10.5 Recovering MD devices and logical volumes .......................................................................................... 162
6.11 Collecting system information .............................................................................................. 166
7 Glossary ............................................................................................................................... 168