User manual

Table Of Contents
161 Copyright © Acronis International GmbH, 2002-2014
In any of the above cases, provide an archive name that is unique to the destination folder or vault. If
you need to redo the export using the same archive name, first delete the archive that resulted from
the previous export operation.
8.2.5 Access credentials for destination
Specify credentials required for access to the location where the resulting archive will be stored. The
user whose name is specified will be considered as the archive owner.
To specify credentials
1. Select one of the following:
Use the current user credentials
The software will access the destination using the credentials of the current user.
Use the following credentials
The software will access the destination using the credentials you specify. Use this option if
the task account does not have access permissions to the destination.
Specify:
User name. When entering the name of an Active Directory user account, be sure to also
specify the domain name (DOMAIN\Username or Username@domain).
Password. The password for the account.
2. Click OK.
According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.
8.3 Mounting an image
Mounting volumes from a disk backup (image) lets you access the volumes as though they were
physical disks. Multiple volumes contained in the same backup can be mounted within a single
mount operation. The mount operation is available when the console is connected to a managed
machine running either Windows or Linux.
Mounting volumes in the read/write mode enables you to modify the backup content, that is, save,
move, create, delete files or folders, and run executables consisting of one file. In this mode, the
software creates an incremental backup containing the changes you make to the backup content.
Please be aware that none of the subsequent backups will contain these changes.
You can mount volumes if the disk backup is stored in a local folder (except optical disks), Acronis
Secure Zone, or on a network share.
Usage scenarios
Sharing: mounted images can be easily shared to networked users.
"Band aid" database recovery solution: mount up an image that contains an SQL database from
a recently failed machine. This will provide access to the database until the failed machine is
recovered.
Offline virus clean: if a machine is attacked, the administrator shuts it down, boots with bootable
media and creates an image. Then, the administrator mounts this image in read/write mode,
scans and cleans it with an antivirus program, and finally recovers the machine.